Mobile Navbar
Contact Us
PRODUCTS
APPLICATIONS
HOW TO BUY
SUPPORT
ABOUT PERLE
Industry News
Archive:
Select Month
January
February
March
April
May
June
July
August
September
October
November
December
Select Year
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
Thursday, February 25, 2021
The advantages of data analytics for modern banking
Analytics software has changed the way banking data is processed, making it possible to identify trends and patterns which can used to infor ...
Monday, February 22, 2021
Implementing automation for better retail processes
Automating retail processes can reduce overhead, cut down on human error and speed back office functions. ...
Friday, February 19, 2021
Managing cyberthreats to government agencies
Every level of government can take steps to help prevent cyberattacks, but a coordinated effort is needed across agencies to maintain the le ...
Wednesday, February 17, 2021
Smart buildings and building management
Smart buildings and smart cities are enabled by the Internet of Things, as it connects data and devices, and integrates facility management. ...
Monday, February 15, 2021
IoT and the future of remote health care
The internet of things is leading transformation within the health care industry. ...
Friday, February 12, 2021
1G, 2G, 3G, 4G and 5G — What's the difference?
Every advancement in technology is called a new generation, and data network capability or performance is no exception. But what is the diff ...
Thursday, February 11, 2021
The intersection of data sets, science and storage
An investment in data science may make the difference between the survival of a business and forced liquidation. ...
Thursday, February 11, 2021
Leonardo chooses Perle PoE Switches to power ALPR cameras
IDS Industrial Switches provide up to 30 Watts PoE to Elsag® Fixed Plate Hunter ALPR cameras mounted along highways, bridges, tunnels, and o ...
Tuesday, February 9, 2021
How 5G is revolutionizing the logistics industry
Transport and logistics have become increasingly complex over the past year, forcing supply chains to completely transform to meet new chall ...
Monday, February 8, 2021
The advantages of using a managed services provider
Using a managed services provider can transform your small- or medium-sized business, giving you the technology you need to operate efficien ...
Thursday, February 4, 2021
Future-proofing your network
Future-proofing your network means your organization must let go of legacy network designs which are inefficient and inflexible. ...
Thursday, January 28, 2021
The virtual internet of things: An untapped resource
Visual IoT combines modern IoT network and device capabilities with visual data streams, creating an immersive experience with several layer ...
Tuesday, January 26, 2021
Business owners, insurance, smart devices and the IoT
As the Internet of Things advances and office equipment get smarter, insurance companies and business owners can work together to reduce ris ...
Friday, January 22, 2021
Defend against cybersecurity threats with these three tips
Employee education is just the first step in cybersecurity. You need to follow through with concrete actions to make your networks safer. He ...
Thursday, January 21, 2021
Where is big data going in 2021?
In 2021, experts predict we'll see big changes in how data is gathered, stored, and analyzed, and what computing power is required to manage ...
Wednesday, January 20, 2021
Dealing with the vulnerabilities of a distributed workforce
With the global pandemic sending employees home to work, often on their own devices, cybersecurity flaws become glaringly apparent at all le ...
Tuesday, January 19, 2021
Ariane Medical use Perle WiFi Device Servers to make their P
IOLAN WiFi Device Servers provide a safe and secure way to transmit serial RS232 data over WiFi ...
Wednesday, January 13, 2021
Operational resiliency in a post-Covid world
Fragility and specific points of weakness in global supply chains and service networks were swiftly revealed in 2020, but most companies ove ...
Friday, January 8, 2021
What is Co-Managed IT?
Across the globe, enterprises are shifting to a new IT model: co-managed IT. What is it, how does it work and what are the advantages? ...
Tuesday, January 5, 2021
5G, IIoT and Your Company's Digital Transformation
5G’s ultra low latency, high-level connectivity and frankly enormous concurrent data capacity allow companies to become more demand responsi ...
Thursday, December 31, 2020
Keep your digital transformation plans from failing
How can you plan and execute a successful digital transformation initiative without falling prey to stagnation? ...
Thursday, December 31, 2020
Maintaining connectivity and networking components in harsh
Harsh conditions demand top quality, tested and proven industrial-grade connectivity equipment to prevent repeated equipment malfunctions an ...
Monday, December 14, 2020
Improving the industrial sector's use of energy with IoT
IoT devices can help manage the flow of energy and reduce waste, keeping expenditures closely tied to production values for lowered overhead ...
Friday, December 11, 2020
How 5G will transform remote health care
With the advent of telehealth, videoconferencing allows patients and doctors to have appointments on demand. 5G is improving the experience, ...
Thursday, December 10, 2020
AcoustAlert integrates Perle Ethernet Extenders into Perimet
Keeping unauthorized intruders from entering a business location is a critical part of protecting corporate assets. In many cases, fencing o ...
Thursday, December 10, 2020
Beyond the border: Perimeter-free network security
Implementing borderless security is simply a matter of marrying identity and access management with endpoint protection to control how your ...
Monday, December 7, 2020
How IoT apps help companies scale for success
From research and design to manufacturing, warehousing, logistics and all points on the supply chain, the IoT can help streamline and speed ...
Thursday, December 3, 2020
Protecting your company network from unauthorized IoT device
The more connected devices you have, the higher your risk is of a breach in your network. Does this mean you should shun the IoT? Not at all ...
Wednesday, December 2, 2020
Artificial intelligence, machine learning and the IoT
The intersect of Machine Learning and artificial intelligence with the Internet of Things is changing the face of data analysis across indus ...
Tuesday, November 24, 2020
Securing your IoT network devices
If you've implemented Internet of Things (IoT) networks and devices, you need to ensure that they and all data collected and transmitted are ...
Friday, November 20, 2020
How 5G is transforming patient experiences
The adoption of 5G makes it possible for patients in a variety of settings to receive personalized and preventive care, changing the way hea ...
Thursday, November 19, 2020
QBE chose Perle Console Servers for Out-of-Band Management
If the network goes down, secure remote access to QBE data center and branch office IT equipment is enabled through IOLAN Console Servers ...
Monday, November 16, 2020
Building a lean supply chain: How IoT is changing logistics
The Internet of Things (IoT) provides real time insight into every move your goods make along the supply chain, delivering more accountabili ...
Thursday, November 12, 2020
How IoT is helping health care during the COVID-19 pandemic
The IoT devices already in place around the world helped provide a front line of defense against COVID-19. Find out what the future holds fo ...
Wednesday, November 11, 2020
How IoT innovation is helping supply chains during COVID-19
Both the health care and food and beverage industries are using IoT devices to ensure that their supply chains run as smoothly as possible d ...
Wednesday, November 11, 2020
Perle launches IOLAN SCR1618 Secure Out-of-Band Management C
With support for cloud-based hosting, when deployed top-of-rack, or at a remote location, network engineers will have secure remote access t ...
Monday, November 9, 2020
Cybersecurity policy a must in all parts of life
Cybersecurity is just as important for large government organizations as it is individuals looking to protect their personal information. ...
Tuesday, November 3, 2020
AI and machine learning is helping researchers unlock COVID-
Researchers have been using AI and machine learning to comb through data and find patterns in COVID-19 symptoms and potential treatments. ...
Thursday, October 29, 2020
Artificial intelligence innovation may be coming to your wor
We take a look at how artificial intelligence could improve work. ...
Wednesday, October 28, 2020
New work-from-home protocols may create cybersecurity vulner
A loose approach to cybersecurity could leave your organization open to threats from both outside and within your network. ...
Tuesday, October 27, 2020
IoT devices may have unexpected vulnerabilities
With many devices being so new, cybersecurity experts are still finding the best ways to mitigate some common threats. ...
Monday, October 26, 2020
Russian and Iranian hacking threats highlight need for elect
The FBI reported that a Russian hacking group infiltrated and accessed U.S. voter data of two local government jurisdictions, amongst other ...
Thursday, October 22, 2020
Is the future of cybersecurity automated?
Could many of your future tech and cybersecurity struggles be handled by a machine, rather than an IT professional? ...
Thursday, October 22, 2020
Companies are looking to IoT innovation in a post-COVID-19 w
As the COVID-19 pandemic forces individuals and businesses to rethink almost every part of how they conduct themselves, from shopping for gr ...
Thursday, October 15, 2020
Microsoft report reveals IoT growth during COVID-19
A new Microsoft report noted that the IoT was one of the few sectors to see continued growth during the COVID-19 pandemic. ...
Thursday, October 15, 2020
Perle Ethernet Extenders enable Athens International Airport
Ethernet Extenders use existing 2-wire twisted pair cabling to provide up to 30Watts of power and extend data transmission distance for secu ...
Tuesday, October 13, 2020
Security researchers warn of new botnet with "bricking" capa
Security researchers recently discovered a botnet capable of bricking IoT devices, routers and servers. ...
Wednesday, September 30, 2020
Data security remains a top concern for cloud transformation
IT leaders must carefully weigh the advantages and limitations of cloud services with a particular focus on cyber security. ...
Monday, September 28, 2020
Researchers find new IoT security risk: Bluetooth spoofing
A new IoT remote access vulnerability is putting devices with BLE functionality at risk of exploitation. ...
Wednesday, September 23, 2020
4 IoT security risks every enterprise should know about
The rapid adoption of IoT technologies has introduced a variety of cyber security concerns into modern enterprise environments. ...
Archive:
Select Month
January
February
March
April
May
June
July
August
September
October
November
December
Select Year
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
Back to top