
IBM 5 in 5 Campaign Will Bring Blockchain and AI to Food Industry
IBM predicts that technology boosts in artificial intelligence, blockchain, and other technologies will help everyone involved within the foodchain thanks to its 5 in 5 campaign.

March 6, 2019 Jessica Messier Leave a Comment
IBM predicts that technology boosts in artificial intelligence, blockchain, and other technologies will help everyone involved within the foodchain thanks to its 5 in 5 campaign.
March 5, 2019 Sam Harton Leave a Comment
Though it is understandable that Netflix would need to process and save your decisions as you walk through Black Mirror’s choose-your-own-adventure movie, they are reportedly storing and aggregating that data.
March 5, 2019 Jessica Messier Leave a Comment
Aside from keeping people safe at large events like concerts, facial recognition technology is now being more widely used for marketing opportunities.
March 4, 2019 Sam Harton Leave a Comment
Bringing new technologies into your business can threaten your employees’ sense of privacy, trust, and job satisfaction, so it’s important you are careful with implementation.
March 4, 2019 Jessica Messier Leave a Comment
Decision makers in the corporate world can use technology to provide employees better learning opportunities while barely adjusting their workflows.
March 3, 2019 Jessica Messier Leave a Comment
A recent test shows that most of them are a sham, and don’t protect users against viruses as advertised.
March 1, 2019 Jonathan Blackwood Leave a Comment
What types of cyberattacks were carried out this week, March 1, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.
February 28, 2019 Sam Harton Leave a Comment
The FCC has been swamped with complaints regarding robocall frequency, which hit new spikes in 2018 and are expected to keep rising this year.
February 28, 2019 Sam Harton Leave a Comment
Entering the age of 5G cautiously, the Trump administration wants to limit Chinese control over American wireless networks and beef up cybersecurity efforts.
February 27, 2019 Paul Konikowski Leave a Comment
Most of these vulns can be patched by updating the firmware, securing the network, and/or enabling the passwords on the devices. But uncovering and patching these device vulnerabilities is only one aspect of securing AV installations.
FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets
View all Guides
Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.
Enter Today!