[vc_row css=”.vc_custom_1570684364676{margin-right: 15px !important;margin-left: 15px !important;border-radius: 1px !important;}” el_class=”white_papper”][vc_column width=”2/3″][vc_row_inner css=”.vc_custom_1570684949880{padding-bottom: -100px !important;}”][vc_column_inner width=”1/4″][vc_icon icon_fontawesome=”fa fa-calendar” color=”custom” size=”xs” custom_color=”#75cdde” css=”.vc_custom_1570684054544{margin-top: -20px !important;}”][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text css=”.vc_custom_1570684198137{margin-top: -5px !important;margin-left: -150px !important;}”]17-07-2019[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”Four steps to IoT security” font_container=”tag:h2|text_align:left|color:%2375cdde” google_fonts=”font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:500%20bold%20regular%3A500%3Anormal” css=”.vc_custom_1570685112477{border-left-width: 15px !important;padding-left: 15px !important;}”][vc_column_text css=”.vc_custom_1570684976954{border-left-width: 15px !important;padding-left: 15px !important;}”]

IoT devices are exposed to a wide variety of rapidly evolving threats, often intended to disrupt their communications or misuse their capabilities. This white paper equips you with the background, vocabulary and key concepts necessary to develop and deploy IoT ecosystems that are resilient to evolving cyber-threats.

read more

 [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_empty_space height=”200px”][mpc_button url=”url:http%3A%2F%2Fglob-tel.com%2Fwp-content%2Fuploads%2F2019%2F10%2FTest-file.pdf|title:White%20Paper%20PDF%20download|target:%20_blank|” font_preset=”mpc_preset_8″ font_color=”#ffffff” font_transform=”none” font_align=”center” title=”PDF Version” icon=”etl etl-documents” icon_color=”#ffffff” icon_effect=”stay-left” background_color=”#75cdde” padding_divider=”true” padding_css=”padding-left:10px;” margin_divider=”true” margin_css=”margin-left:50px;” hover_border_divider=”true”][/vc_column][/vc_row][vc_row css=”.vc_custom_1570684364676{margin-right: 15px !important;margin-left: 15px !important;border-radius: 1px !important;}” el_class=”white_papper”][vc_column width=”2/3″][vc_row_inner css=”.vc_custom_1570684949880{padding-bottom: -100px !important;}”][vc_column_inner width=”1/4″][vc_icon icon_fontawesome=”fa fa-calendar” color=”custom” size=”xs” custom_color=”#75cdde” css=”.vc_custom_1570684054544{margin-top: -20px !important;}”][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text css=”.vc_custom_1570684198137{margin-top: -5px !important;margin-left: -150px !important;}”]17-07-2019[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”Future-proofing EV charging solutions with Wi-Fi” font_container=”tag:h2|text_align:left|color:%2375cdde” google_fonts=”font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:500%20bold%20regular%3A500%3Anormal” css=”.vc_custom_1570685441703{border-left-width: 15px !important;padding-left: 15px !important;}”][vc_column_text css=”.vc_custom_1570684976954{border-left-width: 15px !important;padding-left: 15px !important;}”]

IoT devices are exposed to a wide variety of rapidly evolving threats, often intended to disrupt their communications or misuse their capabilities. This white paper equips you with the background, vocabulary and key concepts necessary to develop and deploy IoT ecosystems that are resilient to evolving cyber-threats.

read more

 [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_empty_space height=”200px”][mpc_button url=”url:http%3A%2F%2Fglob-tel.com%2Fwp-content%2Fuploads%2F2019%2F10%2FTest-file.pdf|title:White%20Paper%20PDF%20download|target:%20_blank|” font_preset=”mpc_preset_8″ font_color=”#ffffff” font_transform=”none” font_align=”center” title=”PDF Version” icon=”etl etl-documents” icon_color=”#ffffff” icon_effect=”stay-left” background_color=”#75cdde” padding_divider=”true” padding_css=”padding-left:10px;” margin_divider=”true” margin_css=”margin-left:50px;” hover_border_divider=”true”][/vc_column][/vc_row][vc_row css=”.vc_custom_1570684364676{margin-right: 15px !important;margin-left: 15px !important;border-radius: 1px !important;}” el_class=”white_papper”][vc_column width=”2/3″][vc_row_inner css=”.vc_custom_1570684949880{padding-bottom: -100px !important;}”][vc_column_inner width=”1/4″][vc_icon icon_fontawesome=”fa fa-calendar” color=”custom” size=”xs” custom_color=”#75cdde” css=”.vc_custom_1570684054544{margin-top: -20px !important;}”][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text css=”.vc_custom_1570684198137{margin-top: -5px !important;margin-left: -150px !important;}”]17-07-2019[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”Energy Harvesting” font_container=”tag:h2|text_align:left|color:%2375cdde” google_fonts=”font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:500%20bold%20regular%3A500%3Anormal” css=”.vc_custom_1570685459279{border-left-width: 15px !important;padding-left: 15px !important;}”][vc_column_text css=”.vc_custom_1570684976954{border-left-width: 15px !important;padding-left: 15px !important;}”]

IoT devices are exposed to a wide variety of rapidly evolving threats, often intended to disrupt their communications or misuse their capabilities. This white paper equips you with the background, vocabulary and key concepts necessary to develop and deploy IoT ecosystems that are resilient to evolving cyber-threats.

read more

 [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_empty_space height=”200px”][mpc_button url=”url:http%3A%2F%2Fglob-tel.com%2Fwp-content%2Fuploads%2F2019%2F10%2FTest-file.pdf|title:White%20Paper%20PDF%20download|target:%20_blank|” font_preset=”mpc_preset_8″ font_color=”#ffffff” font_transform=”none” font_align=”center” title=”PDF Version” icon=”etl etl-documents” icon_color=”#ffffff” icon_effect=”stay-left” background_color=”#75cdde” padding_divider=”true” padding_css=”padding-left:10px;” margin_divider=”true” margin_css=”margin-left:50px;” hover_border_divider=”true”][/vc_column][/vc_row][vc_row css=”.vc_custom_1570684364676{margin-right: 15px !important;margin-left: 15px !important;border-radius: 1px !important;}” el_class=”white_papper”][vc_column width=”2/3″][vc_row_inner css=”.vc_custom_1570684949880{padding-bottom: -100px !important;}”][vc_column_inner width=”1/4″][vc_icon icon_fontawesome=”fa fa-calendar” color=”custom” size=”xs” custom_color=”#75cdde” css=”.vc_custom_1570684054544{margin-top: -20px !important;}”][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text css=”.vc_custom_1570684198137{margin-top: -5px !important;margin-left: -150px !important;}”]17-07-2019[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”Accurate timing for the IoT” font_container=”tag:h2|text_align:left|color:%2375cdde” google_fonts=”font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:500%20bold%20regular%3A500%3Anormal” css=”.vc_custom_1570685474570{border-left-width: 15px !important;padding-left: 15px !important;}”][vc_column_text css=”.vc_custom_1570684976954{border-left-width: 15px !important;padding-left: 15px !important;}”]

IoT devices are exposed to a wide variety of rapidly evolving threats, often intended to disrupt their communications or misuse their capabilities. This white paper equips you with the background, vocabulary and key concepts necessary to develop and deploy IoT ecosystems that are resilient to evolving cyber-threats.

read more

 [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_empty_space height=”200px”][mpc_button url=”url:http%3A%2F%2Fglob-tel.com%2Fwp-content%2Fuploads%2F2019%2F10%2FTest-file.pdf|title:White%20Paper%20PDF%20download|target:%20_blank|” font_preset=”mpc_preset_8″ font_color=”#ffffff” font_transform=”none” font_align=”center” title=”PDF Version” icon=”etl etl-documents” icon_color=”#ffffff” icon_effect=”stay-left” background_color=”#75cdde” padding_divider=”true” padding_css=”padding-left:10px;” margin_divider=”true” margin_css=”margin-left:50px;” hover_border_divider=”true”][/vc_column][/vc_row][vc_row css=”.vc_custom_1570684364676{margin-right: 15px !important;margin-left: 15px !important;border-radius: 1px !important;}” el_class=”white_papper”][vc_column width=”2/3″][vc_row_inner css=”.vc_custom_1570684949880{padding-bottom: -100px !important;}”][vc_column_inner width=”1/4″][vc_icon icon_fontawesome=”fa fa-calendar” color=”custom” size=”xs” custom_color=”#75cdde” css=”.vc_custom_1570684054544{margin-top: -20px !important;}”][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text css=”.vc_custom_1570684198137{margin-top: -5px !important;margin-left: -150px !important;}”]17-07-2019[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”The Navigation Conundrum” font_container=”tag:h2|text_align:left|color:%2375cdde” google_fonts=”font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:500%20bold%20regular%3A500%3Anormal” css=”.vc_custom_1570685491611{border-left-width: 15px !important;padding-left: 15px !important;}”][vc_column_text css=”.vc_custom_1570684976954{border-left-width: 15px !important;padding-left: 15px !important;}”]

IoT devices are exposed to a wide variety of rapidly evolving threats, often intended to disrupt their communications or misuse their capabilities. This white paper equips you with the background, vocabulary and key concepts necessary to develop and deploy IoT ecosystems that are resilient to evolving cyber-threats.

read more

 [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_empty_space height=”200px”][mpc_button url=”url:http%3A%2F%2Fglob-tel.com%2Fwp-content%2Fuploads%2F2019%2F10%2FTest-file.pdf||target:%20_blank|” font_preset=”mpc_preset_8″ font_color=”#ffffff” font_transform=”none” font_align=”center” title=”PDF Version” icon=”etl etl-documents” icon_color=”#ffffff” icon_effect=”stay-left” background_color=”#75cdde” padding_divider=”true” padding_css=”padding-left:10px;” margin_divider=”true” margin_css=”margin-left:50px;” hover_border_divider=”true”][/vc_column][/vc_row][vc_row css=”.vc_custom_1570684364676{margin-right: 15px !important;margin-left: 15px !important;border-radius: 1px !important;}” el_class=”white_papper”][vc_column width=”2/3″][vc_row_inner css=”.vc_custom_1570684949880{padding-bottom: -100px !important;}”][vc_column_inner width=”1/4″][vc_icon icon_fontawesome=”fa fa-calendar” color=”custom” size=”xs” custom_color=”#75cdde” css=”.vc_custom_1570684054544{margin-top: -20px !important;}”][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text css=”.vc_custom_1570684198137{margin-top: -5px !important;margin-left: -150px !important;}”]17-07-2019[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”Innovation Trends in Cellular Connectivity for Alarm Panels” font_container=”tag:h2|text_align:left|color:%2375cdde” google_fonts=”font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:500%20bold%20regular%3A500%3Anormal” css=”.vc_custom_1570685506677{border-left-width: 15px !important;padding-left: 15px !important;}”][vc_column_text css=”.vc_custom_1570684976954{border-left-width: 15px !important;padding-left: 15px !important;}”]

IoT devices are exposed to a wide variety of rapidly evolving threats, often intended to disrupt their communications or misuse their capabilities. This white paper equips you with the background, vocabulary and key concepts necessary to develop and deploy IoT ecosystems that are resilient to evolving cyber-threats.

read more

 [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_empty_space height=”200px”][mpc_button url=”url:http%3A%2F%2Fglob-tel.com%2Fwp-content%2Fuploads%2F2019%2F10%2FTest-file.pdf||target:%20_blank|” font_preset=”mpc_preset_8″ font_color=”#ffffff” font_transform=”none” font_align=”center” title=”PDF Version” icon=”etl etl-documents” icon_color=”#ffffff” icon_effect=”stay-left” background_color=”#75cdde” padding_divider=”true” padding_css=”padding-left:10px;” margin_divider=”true” margin_css=”margin-left:50px;” hover_border_divider=”true”][/vc_column][/vc_row][vc_row css=”.vc_custom_1570684364676{margin-right: 15px !important;margin-left: 15px !important;border-radius: 1px !important;}” el_class=”white_papper”][vc_column width=”2/3″][vc_row_inner css=”.vc_custom_1570684949880{padding-bottom: -100px !important;}”][vc_column_inner width=”1/4″][vc_icon icon_fontawesome=”fa fa-calendar” color=”custom” size=”xs” custom_color=”#75cdde” css=”.vc_custom_1570684054544{margin-top: -20px !important;}”][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text css=”.vc_custom_1570684198137{margin-top: -5px !important;margin-left: -150px !important;}”]17-07-2019[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”Super-E: low power and good performance” font_container=”tag:h2|text_align:left|color:%2375cdde” google_fonts=”font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:500%20bold%20regular%3A500%3Anormal” css=”.vc_custom_1570685521076{border-left-width: 15px !important;padding-left: 15px !important;}”][vc_column_text css=”.vc_custom_1570684976954{border-left-width: 15px !important;padding-left: 15px !important;}”]

IoT devices are exposed to a wide variety of rapidly evolving threats, often intended to disrupt their communications or misuse their capabilities. This white paper equips you with the background, vocabulary and key concepts necessary to develop and deploy IoT ecosystems that are resilient to evolving cyber-threats.

read more

 [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_empty_space height=”200px”][mpc_button url=”url:http%3A%2F%2Fglob-tel.com%2Fwp-content%2Fuploads%2F2019%2F10%2FTest-file.pdf||target:%20_blank|” font_preset=”mpc_preset_8″ font_color=”#ffffff” font_transform=”none” font_align=”center” title=”PDF Version” icon=”etl etl-documents” icon_color=”#ffffff” icon_effect=”stay-left” background_color=”#75cdde” padding_divider=”true” padding_css=”padding-left:10px;” margin_divider=”true” margin_css=”margin-left:50px;” hover_border_divider=”true”][/vc_column][/vc_row][vc_row css=”.vc_custom_1570684364676{margin-right: 15px !important;margin-left: 15px !important;border-radius: 1px !important;}” el_class=”white_papper”][vc_column width=”2/3″][vc_row_inner css=”.vc_custom_1570684949880{padding-bottom: -100px !important;}”][vc_column_inner width=”1/4″][vc_icon icon_fontawesome=”fa fa-calendar” color=”custom” size=”xs” custom_color=”#75cdde” css=”.vc_custom_1570684054544{margin-top: -20px !important;}”][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text css=”.vc_custom_1570684198137{margin-top: -5px !important;margin-left: -150px !important;}”]17-07-2019[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”Design guide for small, high performance GNSS patch antenna applications” font_container=”tag:h2|text_align:left|color:%2375cdde” google_fonts=”font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:500%20bold%20regular%3A500%3Anormal” css=”.vc_custom_1570685534474{border-left-width: 15px !important;padding-left: 15px !important;}”][vc_column_text css=”.vc_custom_1570684976954{border-left-width: 15px !important;padding-left: 15px !important;}”]

IoT devices are exposed to a wide variety of rapidly evolving threats, often intended to disrupt their communications or misuse their capabilities. This white paper equips you with the background, vocabulary and key concepts necessary to develop and deploy IoT ecosystems that are resilient to evolving cyber-threats.

read more

 [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_empty_space height=”200px”][mpc_button url=”url:http%3A%2F%2Fglob-tel.com%2Fwp-content%2Fuploads%2F2019%2F10%2FTest-file.pdf||target:%20_blank|” font_preset=”mpc_preset_8″ font_color=”#ffffff” font_transform=”none” font_align=”center” title=”PDF Version” icon=”etl etl-documents” icon_color=”#ffffff” icon_effect=”stay-left” background_color=”#75cdde” padding_divider=”true” padding_css=”padding-left:10px;” margin_divider=”true” margin_css=”margin-left:50px;” hover_border_divider=”true”][/vc_column][/vc_row][vc_row css=”.vc_custom_1570684364676{margin-right: 15px !important;margin-left: 15px !important;border-radius: 1px !important;}” el_class=”white_papper”][vc_column width=”2/3″][vc_row_inner css=”.vc_custom_1570684949880{padding-bottom: -100px !important;}”][vc_column_inner width=”1/4″][vc_icon icon_fontawesome=”fa fa-calendar” color=”custom” size=”xs” custom_color=”#75cdde” css=”.vc_custom_1570684054544{margin-top: -20px !important;}”][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text css=”.vc_custom_1570684198137{margin-top: -5px !important;margin-left: -150px !important;}”]17-07-2019[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”Use Cases and Regulatory Approvals for Wireless Medical Devices” font_container=”tag:h2|text_align:left|color:%2375cdde” google_fonts=”font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:500%20bold%20regular%3A500%3Anormal” css=”.vc_custom_1570685548840{border-left-width: 15px !important;padding-left: 15px !important;}”][vc_column_text css=”.vc_custom_1570684976954{border-left-width: 15px !important;padding-left: 15px !important;}”]

IoT devices are exposed to a wide variety of rapidly evolving threats, often intended to disrupt their communications or misuse their capabilities. This white paper equips you with the background, vocabulary and key concepts necessary to develop and deploy IoT ecosystems that are resilient to evolving cyber-threats.

read more

 [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_empty_space height=”200px”][mpc_button url=”url:http%3A%2F%2Fglob-tel.com%2Fwp-content%2Fuploads%2F2019%2F10%2FTest-file.pdf||target:%20_blank|” font_preset=”mpc_preset_8″ font_color=”#ffffff” font_transform=”none” font_align=”center” title=”PDF Version” icon=”etl etl-documents” icon_color=”#ffffff” icon_effect=”stay-left” background_color=”#75cdde” padding_divider=”true” padding_css=”padding-left:10px;” margin_divider=”true” margin_css=”margin-left:50px;” hover_border_divider=”true”][/vc_column][/vc_row][vc_row css=”.vc_custom_1570684364676{margin-right: 15px !important;margin-left: 15px !important;border-radius: 1px !important;}” el_class=”white_papper”][vc_column width=”2/3″][vc_row_inner css=”.vc_custom_1570684949880{padding-bottom: -100px !important;}”][vc_column_inner width=”1/4″][vc_icon icon_fontawesome=”fa fa-calendar” color=”custom” size=”xs” custom_color=”#75cdde” css=”.vc_custom_1570684054544{margin-top: -20px !important;}”][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text css=”.vc_custom_1570684198137{margin-top: -5px !important;margin-left: -150px !important;}”]17-07-2019[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”Achieving Centimeter Level Performance with Low Cost Antennas” font_container=”tag:h2|text_align:left|color:%2375cdde” google_fonts=”font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:500%20bold%20regular%3A500%3Anormal” css=”.vc_custom_1570685573256{border-left-width: 15px !important;padding-left: 15px !important;}”][vc_column_text css=”.vc_custom_1570684976954{border-left-width: 15px !important;padding-left: 15px !important;}”]

IoT devices are exposed to a wide variety of rapidly evolving threats, often intended to disrupt their communications or misuse their capabilities. This white paper equips you with the background, vocabulary and key concepts necessary to develop and deploy IoT ecosystems that are resilient to evolving cyber-threats.

read more

 [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_empty_space height=”200px”][mpc_button url=”url:http%3A%2F%2Fglob-tel.com%2Fwp-content%2Fuploads%2F2019%2F10%2FTest-file.pdf||target:%20_blank|” font_preset=”mpc_preset_8″ font_color=”#ffffff” font_transform=”none” font_align=”center” title=”PDF Version” icon=”etl etl-documents” icon_color=”#ffffff” icon_effect=”stay-left” background_color=”#75cdde” padding_divider=”true” padding_css=”padding-left:10px;” margin_divider=”true” margin_css=”margin-left:50px;” hover_border_divider=”true”][/vc_column][/vc_row]