Remove Leverage Remove Securities Remove Transportation
article thumbnail

iRobot On Cleaning Up Smart Home Security

PYMNTS

Cities around the globe are looking to use the technology to address problems, such as by leveraging connected sensors to detect and report water system leakages. Security continues to be a top IoT concern, however: Mounting data breaches and newly discovered device vulnerabilities have prompted wariness around IoT adoption.

article thumbnail

Africa’s Chinese Trade Tie-Up

Global Finance

But overlending—and US initiatives to extend its security and investment footprint—are challenging its position. Angola now owes China approximately $20 billion, mostly on energy and transportation projects. China continues to dominate trade with the continent. billion, up 1.5% Ethiopia’s debt to China stands at around $13.5

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Loadsmart Lands $90M From BlackRock, Maersk, For Digital Shipping Platform

PYMNTS

Loadsmart said it has instead focused on what its online shipping platform can do for companies in the transportation business on a value-added basis, “coupled with API integrations.”. Instead of offering its services at a discount in hopes of building a base of customers, Loadsmart said it has taken a different approach.

article thumbnail

Identifying and Overcoming Ethical Dilemmas in Business 

CFO Talks

Pressure to Manipulate Financial Results Example: The board pressures you to inflate revenue projections to secure a loan or attract investors, suggesting it’s “just this once” to meet strategic goals. A colleague hints at leveraging this information to trade shares. Common Ethical Dilemmas CFOs Face—and How to Address Them 1.

article thumbnail

Deep Dive: Confronting APIs’ Authentication, DDoS Security Threats

PYMNTS

Companies also leverage APIs to connect to third parties, either to call up information or allow these entities to use their data. Each API an organization leverages gives hackers a new opportunity through which to exploit or infiltrate its network and systems — unless that API is properly secured. Oversight And Authentication.

article thumbnail

Tokenization And Getting A 360-Degree View Into Consumer Spending

PYMNTS

Tokens are incredibly powerful tools to secure data and safely transport it from one point to another. He said tokens are capable of providing a wide world of possibilities beyond their traditional use as just security tools. A Low-Touch Future. Tokenization Can Help Build Sales. Smart Merchants Will Be Proactive.

article thumbnail

MOBI Releases Second Installment Of Blockchain Standard For Vehicle Identity

PYMNTS

A secure digital vehicle identity sets the foundation for a fully automatic network for usage-based transportation services," MOBI COO and Co-Founder Tram Vo said in the announcement. "We Maintenance traceability and vehicle registration are two focuses for the working group. "A In 2019, J.P.