Master your role, transform your business and tap into an unsurpassed peer network through our world-leading virtual and in-person conferences.
Information Technology
Creating a virtual boundary in which a device, individual or asset can be tracked and monitored or detected if the boundary is violated. Examples are the tracking of pets, children and Alzheimer’s patients, criminals sentenced to home detention, trucks and high-value cargos.
Master your role, transform your business and tap into an unsurpassed peer network through our world-leading virtual and in-person conferences.
Expert insights and strategies to address your priorities and solve your most pressing challenges.