IP Licensing for PC IoT Platforms
ThingsX licenses patented technology, technical know-how, and proprietary methods that enable embedded connectivity, telemetry, and endpoint resilience in PC platforms.
Our IP is integrated by OEMs and platform partners under commercial licensing agreements and is designed to operate independently of the operating system, agents, or user-installed software.
What We License
- Patented Technology
- Technical Know‑How
- Proprietary Methods
Always Connected Infrastructure
Traditional endpoint tools depend on the operating system, power state, or network availability. When those fail, devices disappear. ThingsX removes that dependency. Our embedded connectivity technology ensures devices remain reachable, manageable, and recoverable even when systems are powered off, disconnected, or corrupted. Organizations maintain continuous control across their entire device fleet — anywhere in the world.
Platform Engineering
ThingsX IP is built on system‑level engineering expertise, integration practices, and design knowledge required to implement PC IoT capabilities at OEM scale. Our methods cover embedded firmware, persistent connectivity, and endpoint resilience — engineered to support multi-year PC product lifecycles.
Enterprise Collaboration
ThingsX works with PC OEMs, ODMs, enterprise security and device-management platform providers, and PC ecosystem and silicon partners. Our licensing structures are explicitly defined and aligned with OEM development cycles and deployment volumes.
Continuous Device Control & Recovery
Downtime often occurs because devices become unreachable — not because they cannot be fixed. ThingsX ensures devices remain accessible for diagnostics, recovery, and remediation — even when the operating system fails or the device is offline. With continuous reachability, organizations can restore systems faster, reduce downtime, and eliminate costly manual intervention.
Security Built Below the OS
ThingsX IP operates independently of the operating system, agents, or user-installed software. Core capabilities remain active even when the OS is unavailable — eliminating reliance on dashboards, agents, or software-based controls for critical security actions.