IExec For Entreprise
With 15 years of experience in distributed computing and 6 years in blockchain, our team of experts can address any type of blockchain challenges with...
Categories
Products 48
With 15 years of experience in distributed computing and 6 years in blockchain, our team of experts can address any type of blockchain challenges with...
Create forms on the web that protect information management of important processes.
Bubble is a tiny wearable device that gives you feedback whenever another Bubble is detected within 1.5m or 6ft. Accurate & Affordable: The accura...
SecureFax replaces physical as well as e-faxes so that sensitive data ends up in a protected process for legal management.
Sova is an interdisciplinary and multi-purpose monitoring system contained in a single IoT device. Smart boxes are equipped with cameras and motion de...
Kizy’s K-2 Tracker together with the K-Box+, are a convenient and affordable solution for long-term remote tracking. The K-Box+ has been designed to...
Kizy’s K-2 Tracker is a lightweight (42g) and credit-card sized tracker that provides real-time location updates globally as long as there is GSM an...
Kizy’s K-2 Tracker has a temperature tracking feature that aids cold chain logistics companies monitor the transportation of temperature-sensitive p...
Connects broadband and IoT devices in the USA, Canada and 150+ countries, with 200+ top networks. Supports 2G/3G/LTE and SMS. RESTful API. User-friend...
The LMU-2640 is primarily a fleet tracking device incorporating a powerful processing engine, economical GSM/ GPRS network connectivity and built-in t...
SMANCO (Smart Manhole Cover) integrates smart manhole covers into unique monitoring system. Main function of SMANCO is to detect manhole cover opening...
CSL Router offers instant connectivity for CCTV, HVAC, EAS, Access Control, Payment Terminals and much more. It arrives pre-configured for quick insta...
Simply Smarter Video Surveillance #1 In Cloud Video Surveillance Worldwide
Applications play a vital role in the IoT ecosystem and therefore need to be protected. This is especially true when applications are dealing with sen...
Information security is difficult, there are many areas to consider, a constantly evolving threat landscape, countless potential attack routes to secu...