08/31/19
Vulnerabilities come from all sides — even from the inside. That’s the case with two notable items from recent worldwide cybersecurity activity. Of even greater significance, however, are the ongoing attacks faced by public institutions seen in generations past as practically untouchable: presidential elections and government operations. U.S. Institutions Dealing with Ongoing Attacks A widespread… Read more
08/30/19
Wireless technology garners many of today’s IT-related headlines. However, there are few elements as crucial to a productive setting than reliable network cabling. Recognizing that, ensuring your network cabling service providers deliver on the promise of an efficient and effective network is crucial. To help, here are four network cabling service mistakes to avoid. 1…. Read more
08/01/19
Technology integrates so well into our daily lives that it’s easy to place perhaps too much trust in it. That’s what happened to approximately 100 drivers in California. They trusted Google Maps to find their way out of a traffic jam but ended up stuck in a muddy field. That level of trust can create… Read more
06/25/19
Along with rotary dial phones, cassette-playing Sony Walkman devices, and CRT televisions, add another victim to advancing technology: battle lines. Today, no one is afforded a clear demarcation point between potential conflict and peace. That includes, as we see below, your company. The U.S. Goes After Iran with Cyber Attacks; Iran Attacks Industries Following the… Read more
06/24/19
With the Voice over Internet Protocol (VoIP) market projected to surpass $55 billion by 2025, it’s clear that enterprises remain bullish on the technology. That may provide a good headwind for wireless VoIP, which looks to attract more business users in the coming years. What Is Wireless VoIP? Wireless VoIP takes a cue from its… Read more
06/03/19
Barcoding systems in manufacturing allow for an array of benefits, including materials and equipment inventorying, shipment processing, and equipment tracking. Those benefits and more translate to efficiencies that can directly boost a manufacturer’s bottom line. Holding inventory, for example, can cost an enterprise as much as 30% more than the inventory’s unit cost value. If… Read more
05/24/19
Trust, but verify. It’s advice popularized by President Ronald Reagan during his tenure. He used to help characterize his philosophy toward Soviet leaders on the subject of nuclear disarmament. The need for such due diligence permeates every layer of every enterprise’s IT landscape. News from the last month underscores how even the largest organizations are… Read more
05/14/19
While wireless technology will never be problem-free, the margin of error for manufacturers grows smaller by the day, driven by global competition as well as increasing client and consumer demand for quality and reliability. For a time, manufacturers could hobble along with various wireless problems. That’s no longer the case, though. Add to the competition… Read more
05/02/19
Hackers never take a break from their assaults, so it’s crucial never to take a break from your defense — even if that means spoiling someone’s idea of “pure fun” (see below). Manufacturers Under (Cyber) Attack from the Inside A report recently released by Verizon highlights a common — and serious — cybersecurity threat: people… Read more
04/18/19
By 2025, the industrial Internet of Things (IIoT) market will pass the $900 billion valuation mark worldwide. Among other changes, this ongoing wave of digitization promises to change how manufacturing plants look, operate, and produce goods. A chief component of this change is edge computing — locating data storage closest to the facility or facilities… Read more