To cool down China’s overheated robotics industry, go back to the basics – TechCrunch

He Huang is a partner at Northern Light Venture Capital supporting early-stage enterprise companies. It’s been a tumultuous few years, but China’s manufacturing industry is now on the rebound. Once an industry characterized by low-end manufacturing and intensive labor, it has transformed into a high-end manufacturing hub aided by technology. Automation and robotics has the…

To cool down China’s overheated robotics industry, go back to the basics – TechCrunch

He Huang is a partner at Northern Light Venture Capital supporting early-stage enterprise companies. It’s been a tumultuous few years, but China’s manufacturing industry is now on the rebound. Once an industry characterized by low-end manufacturing and intensive labor, it has transformed into a high-end manufacturing hub aided by technology. Automation and robotics has the…

To cool down China’s overheated robotics industry, go back to the basics – TechCrunch

He Huang is a partner at Northern Light Venture Capital supporting early-stage enterprise companies. It’s been a tumultuous few years, but China’s manufacturing industry is now on the rebound. Once an industry characterized by low-end manufacturing and intensive labor, it has transformed into a high-end manufacturing hub aided by technology. Automation and robotics has the…

Sigfox placed into receivership in France – with six months to find buyers, save jobs

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies. Name Domain Purpose Expiry Type YSC youtube.com YouTube session cookie. Session HTTP wpl_user_preference enterpriseiotinsights.com WP GDPR Cookie Consent Preferences 1 year HTTP PHPSESSID enterpriseiotinsights.com PHP…

Hackers Using Device Registration Trick to Attack Enterprises with Lateral Phishing

Microsoft has disclosed details of a large-scale, multi-phase phishing campaign that uses stolen credentials to register devices on a victim’s network to further propagate spam emails and widen the infection pool. The tech giant said the attacks manifested through accounts that were not secured using multi-factor authentication (MFA), thereby making it possible for the adversary…