2020 IoT Terminal Security White Paper

2020 IoT Terminal Security White Paper

Click the blue text to follow us 1. Introduction In the era of consumer internet, the value of the Internet of Things (IoT) itself has not been fully explored. With the advent of the 5G era, the IoT field has ushered in new development opportunities. The 5G communication technology defines three major application scenarios: eMBB, … Read more

Overview of Automotive Projects and Embedded Systems Based on Xen

Overview of Automotive Projects and Embedded Systems Based on Xen

Disclaimer: The content and images of this article are reprinted from BC-AUTO to the English network. 2019 Global Intelligent Automotive Cybersecurity and Information Security Industry Research Report 2019 China Onboard Gateway Industry Research Report 2019 Global and China Onboard Ultrasonic Radar Industry Research Report 2019 Global and China Surround View ADAS Industry Research Report 2019 … Read more

Using Self-Signed Certificates with QT5 for Accessing Cloud HTTPS REST API Services

Using Self-Signed Certificates with QT5 for Accessing Cloud HTTPS REST API Services

Recently, I worked on an IoT gateway project where the gateway device needed to call the cloud’s REST API. The cloud implemented certain business logic and encapsulated resources into various URI interfaces for external systems to call. As a programmer, you should be quite familiar with REST APIs. Many of the basic services around us … Read more

Understanding the IoT Gateway Market: What is an IoT Gateway?

Understanding the IoT Gateway Market: What is an IoT Gateway?

Follow the IoT Planet to track the trends in the Internet of Things! “IoT Planet” focuses on sharing technologies and applications related to the Internet of Things. The IoT gateway is a device that connects IoT devices, systems, sensors, and the cloud, capable of performing protocol conversion and data collection. It provides local processing and … Read more

Comparative Analysis of Ledger Nano S Plus and Nano X: The Best Hardware Wallet

Comparative Analysis of Ledger Nano S Plus and Nano X: The Best Hardware Wallet

Comparative Analysis of Ledger Nano S Plus and Nano X: The Best Hardware Wallet With the popularity of blockchain technology, the secure storage of crypto assets has become a key focus for investors. Ledger, as a leader in the hardware wallet field, has launched two of the most popular products on the market: the Ledger … Read more

How to Fix Your Computer’s Slow Performance and Overactive Fan

How to Fix Your Computer's Slow Performance and Overactive Fan

Your computer sometimes suddenly becomes very slow, the fan is blowing loudly, and it may be unresponsive even on a new computer. Don’t worry, you might be encountering a common issue with Windows 10 and Windows 11. You can press the shortcut keys “Ctrl+Shift+Esc” to open the Task Manager and check the background processes. The … Read more

Beware! 6 Default Configurations Favored by Attackers

Beware! 6 Default Configurations Favored by Attackers

Default configurations may contain numerous security vulnerabilities. For your network security, here are 6 products and services that need careful examination. When it comes to devices connected to corporate networks, “out of the box” seems like an enticing promise, but little do we know, it is also where the danger lies. Imagine devices being able … Read more

7 IoT Devices That Worry Security Experts

7 IoT Devices That Worry Security Experts

Every day, a large number of IoT devices that have not undergone rigorous security testing are connected to our lives. We must realize that this is a process of gradually accumulating risks. Just as we require vehicles on highways to comply with safety standards and undergo annual inspections to ensure traffic safety, there are no … Read more

How Vulnerable IoT Devices Face Security Challenges

How Vulnerable IoT Devices Face Security Challenges

“ The era of the Internet of Things is quietly approaching. From routers, smart speakers, and refrigerators to cars and industrial equipment, more and more items are connecting to the Internet. However, the rapidly developing IoT brings convenience while also posing security risks, becoming a pain point in the development of the IoT industry. ” … Read more

Six Key Factors to Reduce Security Risks in IoT Devices

Six Key Factors to Reduce Security Risks in IoT Devices

The Internet of Things (IoT) technology is currently in its infancy, but its reputation for weak security has already spread. As more connected devices continue to flood into our daily business and personal lives, IoT technology solution providers should adhere to the following six principles to provide a more reliable level of security. IoT technology … Read more