|By Shelly Palmer||
|April 6, 2014 07:40 PM EDT||
In the last two months, Amazon has spotlighted two new products that allow shoppers to add items to their shopping list without ever typing anything into a search bar. This isn’t a coincidence. The most recent one is Amazon Dash — a thin, wand-like device, revealed on Friday, that includes both a microphone and a barcode scanner. Speak into it or scan a box of cereal or pack of toilet paper to automatically add that product to your AmazonFresh shopping list. For now, it is available only on a trial basis to Amazon customers in San Francisco and Los Angeles who pay for Amazon’s new Prime Fresh membership, which includes grocery delivery. Before Dash, Amazon announced in February that it was adding a technology called Flow to its main shopping app on mobile phones.
Jul. 23, 2016 05:15 AM EDT Reads: 1,087
Jul. 23, 2016 05:00 AM EDT Reads: 1,771
Jul. 23, 2016 05:00 AM EDT Reads: 1,468
Jul. 23, 2016 04:30 AM EDT Reads: 1,898
Jul. 23, 2016 04:30 AM EDT Reads: 1,376
Jul. 23, 2016 04:00 AM EDT Reads: 2,327
Jul. 23, 2016 03:45 AM EDT Reads: 1,569
Jul. 23, 2016 03:45 AM EDT Reads: 1,732
Jul. 23, 2016 03:30 AM EDT Reads: 1,055
Jul. 23, 2016 02:45 AM EDT Reads: 694
Jul. 23, 2016 02:45 AM EDT Reads: 2,022
Jul. 23, 2016 02:30 AM EDT Reads: 732
Jul. 23, 2016 01:15 AM EDT Reads: 1,004
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
Jul. 23, 2016 01:00 AM EDT Reads: 1,142
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
Jul. 23, 2016 12:45 AM EDT Reads: 711