1oT Now Available in Over 150 Countries and Unlocking its Connectivity Platform to MNOs

1oT is becoming the leading global connectivity provider for Internet of Things (IoT) startups and is especially proud of its strong market presence in connected light vehicles segment. 1oT's global SIM cards and self-service based connectivity platform called the 1oT Terminal are being used by hundreds of smart IoT startups all over the world. With this release, 1oT is not only strengthening its position among smaller and medium sized IoT device makers, but is unlocking its platform-as-a-service (PaaS) to large market players, including Mobile Network Operators (MNOs).

Step-by-Step Tutorial of the 1oT Terminal

The 1oT Terminal is a platform where cellular-based IoT devices can be monitored and managed hassle-free. In this post we wish to introduce basic functions users can apply on the platform and show how our web based application looks like (as of April 2017).

GSM / 3G / 4G (LTE) - Which One to Choose for Your IoT Project?

The evolution of mobile networks infrastructure and protocols go back a long way and every new generation of mobile network has served new opportunities for end users. As of today we have three concurrent network types in use: 2G, 3G and 4G. But, when it comes to picking the right network type for your cellular-based IoT project, decision-making might get tough. Which one should you go for?

1oT Launching its Global Self-Service Based Connectivity Platform at Mobile World Congress 2017

1oT announces the launch of its global self-service based platform called 1oT Terminal at Mobile World Congress (MWC) in Barcelona, held on 27 Feb - 2 Mar 2017. The platform is addressed to small and medium-sized startups to help them scale worldwide and deploy cellular connectivity with ease. The launch will take place at MWC - the world's largest exhibition for the mobile industry.

WTH is a Botnet and What Bad Does It Do?

A botnet is a network of computers, all infected with the same malware that enables the attacker to control them. It is usually carried out through a command-and-control (C&C) server, but there are also some peer-to-peer (P2P) botnets. Botnets are often used to perform distributed denial-of-service (DDoS) attacks, send spam and to infect other devices to grow the botnet.

Archive