fbpx

What is a rootkit? And how to stop them

used with permission from Norton by Symantec by Dan Rafter   Computer viruses and other malware are real threats. And rootkits might be the most dangerous, both in the damage they can cause and the difficulty you might have in finding and removing them. Rootkits...

Comparing Wi-Fi 6 and 5G – it’s more than a good connection

Used with the permission of http://thenetwork.cisco.com by Stephanie Chan Why the two wireless technologies will be better together. So, you’re all prepared for the next innovations in mobility and looking for next-generation speeds and more bandwidth. But with all of...

3 quick tips and best practices for better IIoT security

used with permission from HP Tech@Work Joe Hewitson It’s no secret by now that IIoT is a pretty powerful platform for innovation. It’s may also come as no surprise that IIoT security risks represent considerable threats to manufacturing IT. You know what’s not so...

The AI Focus on Our Planet

used with permission from HP Tech@Work Algorithms for the greener good AI is already a huge force in business – but all those hardware advances, big data, and powerful algorithms are pointless if we don’t have clean air to breathe and clean water to drink....