fbpx

What is a rootkit? And how to stop them

used with permission from Norton by Symantec by Dan Rafter   Computer viruses and other malware are real threats. And rootkits might be the most dangerous, both in the damage they can cause and the difficulty you might have in finding and removing them. Rootkits...

Comparing Wi-Fi 6 and 5G – it’s more than a good connection

Used with the permission of http://thenetwork.cisco.com by Stephanie Chan Why the two wireless technologies will be better together. So, you’re all prepared for the next innovations in mobility and looking for next-generation speeds and more bandwidth. But with all of...

3 quick tips and best practices for better IIoT security

used with permission from HP Tech@Work Joe Hewitson It’s no secret by now that IIoT is a pretty powerful platform for innovation. It’s may also come as no surprise that IIoT security risks represent considerable threats to manufacturing IT. You know what’s not so...

The AI Focus on Our Planet

used with permission from HP Tech@Work Algorithms for the greener good AI is already a huge force in business – but all those hardware advances, big data, and powerful algorithms are pointless if we don’t have clean air to breathe and clean water to drink....

4 reasons to move to planning software

used with permission from IBM Big Data & Analytics Hub by Stephanie Freyer, IBM Planning Analytics Marketing Change. The mere mention of the word makes some people uneasy. There are endless behavioral studies dedicated to determining why people resist change....

5G and Wi-Fi 6

used with the permission of http://thenetwork.cisco.com by Scott Gurvey Both promise great increases in the data handling capabilities, enabling a new generation of applications. As you can tell by all the marketing hype, 5G is upon us. The mobile telephone carriers...