With the massive amounts of data being collected and analyzed – and a number of companies abusing the use of that data recently – is it time to introduce privacy laws to keep information safe?
Latest Content
A Case for Cloud-Based Access Control
ProdataKey president Jeff Perri makes a case for the cyber security and utilization benefits of wireless and cloud-based access control.
ProdataKey president Jeff Perri makes a case for the cyber security and utilization benefits of wireless and cloud-based access control.
My TechDecisions Week in Review: Acquisitions in 2018, Trends in 2019, etc.
This week, December 3rd-7th, 2018: Cloud Management in 2018, Sony's Future Learning Collaborative, Tech Trends in 2019 and more.
This week, December 3rd-7th, 2018: Cloud Management in 2018, Sony’s Future Learning Collaborative, Tech Trends in 2019 and more.
Who Got Hacked This Week? December 7 Edition
What types of cyberattacks were carried out this week, December 7, 2018? Read on to find out about the latest cyberattacks and who got hacked this week.
What types of cyberattacks were carried out this week, December 7, 2018? Read on to find out about the latest cyberattacks and who got hacked this week.
Sardis Events World Series of Sales IMAG Webcast
Specializing in delivering world-class corporate events and conferences, Illinois-headquartered Sardis Events provides services from staging and set design to multi-camera image magnification (IMAG) and live webcasting for Fortune 500 companies as well as a variety of professional associations. The Tech Decision A flagship on Sardis’ calendar was Advisors Excel’s 2018 World Series of Sales event. […]
Data Sphere to Grow to 175 Zettabytes by 2025 Research Says
White paper says amount of data created, captured, and shared, our datasphere, will reach epic proportions, led by healthcare and financial services.
White paper says amount of data created, captured, and shared, our datasphere, will reach epic proportions, led by healthcare and financial services.
Miniature Data Converters from Texas Instruments Reduce System Footprint
New data converters add intelligence and functionality to industrial, communications and personal electronics while shrinking system board space.
New data converters add intelligence and functionality to industrial, communications and personal electronics while shrinking system board space.
Infographic: Breaking Down the Top Smart Cities
Smart cities are quickly becoming a reality, with many cities around the globe introducing internet of things (IoT) devices into everyday operations in order to improve their communities. Check out some of the top smart cities in this infographic.
Smart cities are quickly becoming a reality, with many cities around the globe introducing internet of things (IoT) devices into everyday operations in order to improve their communities. Check out some of the top smart cities in this infographic.
You Think You Have Cybersecurity Woes? So Does the Military
The military is working to keep its equipment and networks safe from hackers, including its F-35 aircraft.
The military is working to keep its equipment and networks safe from hackers, including its F-35 aircraft.
AWS Spot Instance and Cloud Security
All cloud providers have some type of a compute product offering which lets the user bid for the resource they need to complete or for more tasks. Amazon web services has led the way, offering a low cost EC2 usage option called Spot Instance. The model is unusual in the sense that tests the true limits of fault tolerance and unexpected interruptions in a software.
All cloud providers have some type of a compute product offering which lets the user bid for the resource they need to complete or for more tasks. Amazon web services has led the way, offering a low cost EC2 usage option called Spot Instance. The model is unusual in the sense that tests the true limits of fault tolerance and unexpected interruptions in a software.









