Cisco Annual Security Report Warns of “Delusions About Cyber Security”

Cisco Annual Security Report Warns of “Delusions About Cyber Security”

The idea of corporate management being delusional about the security of their networks seems almost laughable given the state of the recent successful cyberattacks against companies such as Home Depot, Target, and even Adobe. Yet the network giant Cisco reports that management believes that their networks are secure. Investigations into the security processes as major […]

read more
Mobile Apps Increasingly Becoming Focused on Enterprises

Mobile Apps Increasingly Becoming Focused on Enterprises

In their recent annual report entitled The Global State of Enterprise Mobility 2014/15, the Enterprise Mobility Exchange (EME) stated that businesses are increasingly spending funds allocated to mobile apps in order to increase employee productivity; as well as in traditional areas such as mobile device and application management, mobile security and cloud computing. This information […]

read more
Why Google Glass Isn’t Going To Be Part Of Your SMB

Why Google Glass Isn’t Going To Be Part Of Your SMB

The initial sales pitch for Google Glass, a wearable device that allows the user to search the Internet, make phone calls and take photos and videos, has unofficially been declared dead. The company announced that the device would not be available to the public putting and end to Google Glass in an unceremonious and unexpected […]

read more
Emerging Trends in Cloud Technology

Emerging Trends in Cloud Technology

In the last 10 years, cloud technology has grown from a simple means of storing and retrieving data to a means of running and managing your business and collaborating with suppliers, customers and other partners. If we examine the emerging trends in cloud technology, we see more people using this technology in more ways than […]

read more
Has Flash Outlived Its Usefulness?

Has Flash Outlived Its Usefulness?

Make no mistake about it.  Adobe is an excellent company, and they’re very good about releasing patches, especially when security is at risk.  Unfortunately, they’ve had to be.  Adobe’s Flash technology has been the way in for a number of high profile hacking attacks that have revealed gaping holes in security and raised questions as […]

read more
Digital Fault Lines in the World of Tech

Digital Fault Lines in the World of Tech

Technology has transformed not only the way we do business with each other, globally, but the way we communicate and interact together. In every way that matters, technology has, and will continue for the foreseeable future to change the very fabric of the world around us. It has not, however, done that evenly. There are […]

read more
Leverage Open Source Software and Save Money

Leverage Open Source Software and Save Money

The idea that Open Source Software (OSS) can save a company money is not new. Most OSS applications are free, go beyond the average user’s desktop and are available as enterprise solutions. It is this broader and expanded aspect of open source software that offers intriguing possibilities both now and for the future of enterprise […]

read more
Still Not Sold On 3d Printing? Check This Out.

Still Not Sold On 3d Printing? Check This Out.

Here’s more evidence that 3d printing is poised to change almost everything about our world. A Chinese company called WinSun recently claimed to have printed an entire five-story apartment building using a massive printer measuring some five hundred feet in length. While the apartment building itself is unadorned and undecorated, standing as an example of […]

read more
The Importance of Security on the Future’s Wearable Tech

The Importance of Security on the Future’s Wearable Tech

Like them or not, wearables are coming. Sales projections have them reaching as high as 130 million units across all types of wearable devices by 2018. The problem is that with wearables come some serious security risks that towers above anything we’ve seen so far. A New Type of Risk Right now, in today’s world, […]

read more
Wi-Fi Security Extends Beyond the Router

Wi-Fi Security Extends Beyond the Router

Wi-Fi security has become both a hot topic and a major area of concern for both small businesses and individual consumers. A glance at the list of Wi-Fi connections that pop up on a user’s computer will show varying levels of security and the number of computers that are within range of accessing your computer’s […]

read more
The Most Anticipated Innovations of 2015

The Most Anticipated Innovations of 2015

Perhaps one of the greatest things about the rise of high-speed wireless internet connectivity is that the whole world exists as one gigantic fishbowl now. Most development takes place in plain sight. In fact, it must by design these days, or it doesn’t get attention. If development doesn’t get attention, then it doesn’t get funding. […]

read more
IT Continues To Struggle with Shadow Apps

IT Continues To Struggle with Shadow Apps

The first step in solving a problem that you have is admitting that you have it to begin with. To be able to do that, you have to be looking at the landscape in which the problem resides with eyes that want to see it and know where to look. In the case of “Shadow […]

read more