Filter by topics
edge (32) cloud (21) privacy (2) security (3) cyber-security (1) manufacturing (2) iot (2) smart-cities (1) sustainability (1) logistics (2) shipping (2) anonymity (1) telco (3) networks (1) telecommunications (1) transport (1) public-transport (1) safety (1) energy (2) kubernetes (1) ai (3) machine-learning (1) marketplace (1) ml (1) retail (1)
21 December 2023
Navigating the Waves of Change; How Edge Computing Transforms Maritime Logistics
Maritime commerce has been widely used throughout history and has grown in importance to the point where it’s now responsible for 80% of the world’...
Read blog17 November 2023
Leveraging Edge Computing for Enhanced Transportation Services
The transportation industry is in a constant state of evolution, compelled by the ever-increasing need for efficiency, safety, and passenger satisf...
Read blog10 October 2023
Revolutionizing enterprise telco services with edge computing
Given that providing network services and connectivity is no longer enough due to internet platforms and smartphones, telco companies are faced wit...
Read blog23 August 2023
Redefining logistics and shipping with edge computing
The efficient management of logistics and shipping operations relies on the smooth coordination of multiple tasks, including warehouse operations, ...
Read blog19 July 2023
4 ways edge computing can help you achieve sustainable development goals
In recent years, the urgency to address pressing global challenges has led to increased attention on the United Nations’ Sustainable Development Go...
Read blog25 November 2022
For some time, analysts and industry experts have been heralding edge computing as the next big thing that will revolutionise the IT and telecom in...
Read blog16 November 2022
ICOS; Removing boundaries between IoT, Edge and Cloud
The first ICOS face-to-face meeting took place earlier this month in sunny Vilanova I la Geltru, Catalunya, Spain, uniting more than 20 Consortium ...
Read blog23 August 2022
How to protect manufacturing from cyber security threats
Thanks to guest author Inna Ushakova for sharing her valuable insights into the state of cyber security in the manufacturing industry. Now more th...
Read blog24 May 2022
In poker rooms around the world, players keep their cards close. It’s the only way to avoid prying eyes. There’s an important lesson here for organ...
Read blog