• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Latest Content

Q-SYS Unveils Latest Network Video Endpoint NV-21-HU

Q-SYS' new software-configurable NV-21-HU peripheral adds single-cable option for distribution, bridging and charging.

April 6, 2023 TD Staff Leave a Comment

Q-SYS NV-21-HU two-input, one-output endpoint with support for HDMI and USB-C

Costa Mesa, Calif.-based QSC, developers of the Q-SYS networked audio, video and control platform, announced the latest addition to its native network video solutions by introducing the NV Series NV-21-HU. This is a two-input, one-output endpoint with support for HDMI and USB-C. According to the company, the NV-21-HU thus simplifies installation with a single-cable solution […]

Filed Under: Audio, IT Infrastructure, News, Unified Communications, Video Tagged With: Endpoint, Network, Q-SYS, Q-SYS NV Series, QSC, video

Businesses Beware: April is the Most Dangerous Month for Ransomware Attacks

The month of April is expected to be a high-risk month when it comes to ransomware attacks, according to NordLocker research.

April 6, 2023 TD Staff Leave a Comment

ransomware emsisoft, organization impacted by ransomware

The month of April has been identified as the most dangerous period in terms of ransomware attacks, according to research by end-to-end file encryption provider NordLocker. Last year, the month of April saw 294 ransomware incidents, the most attacks per month in all of 2022. Most of these attacks were carried out against U.S. and […]

Filed Under: IT Infrastructure, Network Security, News Tagged With: Cybersecurity, NordLocker, ransomware

Rocket Software Launches Rocket Content Automation for Data Modernization

Rocket Content Automation is a new tool designed to enable critical operational connections between disparate systems and data sources.

April 5, 2023 Zachary Comeau Leave a Comment

Data analytics Rocket Content Automation

Enterprise software firm Rocket Software is unveiling Rocket Content Automation, a new tool designed to enable critical operational connections between disparate systems and data sources without introducing mainframe migration or compliance risks. According to the Waltham, Mass.-based company, Rocket Content Automation helps drive collaboration between business and IT by creating seamless automation experiences across the […]

Filed Under: Compliance, IT Infrastructure, News Tagged With: data, infrastructure, Rocket Software

AWS Launches Clean Rooms to Help Companies Collaborate on Datasets

AWS Clean Rooms, an analytics service that enables organizations and partners to collaborate on datasets securely, is now generally available.

April 5, 2023 Zachary Comeau Leave a Comment

AWS Amazon Security Lake

Amazon Web Services is launching the general availability of AWS Clean Rooms, an analytics service of AWS Applications designed to help organizations and their partners more easily and securely collaborate on their collective datasets without sharing or copying each other’s data. According to the tech giant, the solution allows customers to quickly create a secure […]

Filed Under: Compliance, IT Infrastructure, News Tagged With: AWS, data

Backup and Storage Devices Contain an Average of 14 Security Issues

Research from cyber resilience company Continuity shows that enterprise backup and storage devices need to be more secure.

April 5, 2023 Zachary Comeau Leave a Comment

backup storage security

With storage and backup devices often representing the last line of defense against ransomware attacks and outages, they should be as secure as possible so organizations can restore their data in a critical time of need. However, new research from cyber resilience company Continuity shows that the average enterprise storage and backup device has 14 […]

Filed Under: Compliance, IT Infrastructure, Network Security, News Tagged With: Backup, Cybersecurity, ransomware, Storage

Three Considerations Before Deploying Generative AI Tools

Organizations should ensure they are insulated from data security issues, innovation risk and ethical concerns when deploying generative AI.

April 4, 2023 Zachary Comeau Leave a Comment

ChatGPT Generative AI Enterprise Considerations

While ChatGPT and generative AI are largely hailed as tools that will usher in a new era of working defined by intelligent assistants and automation, there are a handful of concerns around the technology’s use, including privacy, security, the pace of innovation and ethics. The technology is exciting and has the power to unlock new […]

Filed Under: Compliance, IT Infrastructure, Network Security, News Tagged With: ChatGPT, Chirag Dekate, Gartner, Generative AI

The ABCs of Contact Centers: The Tech Driving Modern Customer Experience

Generative AI technology in contact centers is changing the customer experience for good and companies are reaping the benefits.

April 4, 2023 Scott Kolman Leave a Comment

Chatbot Online customer service with chatbots for support. Artificial Intelligence and Automation Software Technology CRM Customer Support Center

The contact center industry is booming and for good reason — businesses are catching on to the transformative impact that a high-velocity contact center can have on their bottom line. Emerging technology is making contact centers more effective than ever before, and more importantly, helping to change their historically negative perception. According to Statista, the […]

Filed Under: IT Infrastructure, Managed Service, News Tagged With: AI, Automation, Contact Center, Cresta, CX, Generative AI

F5 Releases New AI-Powered App and API Security Tools

New AI tools from F5 give customers better protection and control in managing apps and APIs across on-premises, cloud and edge locations.

April 4, 2023 Zachary Comeau Leave a Comment

F5 headquarters, AI API

Cybersecurity company F5 is releasing new AI-powered app and API security capabilities designed to give customers comprehensive protection and control in managing apps and APIs across on-premises, cloud and edge locations. According to the Seattle-based application services and security company, new machine learning enhancements will provide the company’s cloud security portfolio with advanced API endpoint […]

Filed Under: IT Infrastructure, Network Security, News Tagged With: Cybersecurity, F5

Atera Expands OpenAI Integration With Automated Remediation Loops

Atera's expanded OpenAI integration includes a new feature that enables IT pros to use support tickets to create automated remediation loops.

April 3, 2023 Zachary Comeau Leave a Comment

ChatGPT, OpenAI, iOS, Mobile, App

IT management company Atera is expanding upon its integration with ChatGPT creator OpenAI with a new feature designed to enable IT team to use support tickets to create automated remediation loops. The Israeli company calls this the second phase of its OpenAI integration, following the first phase which focused on script generation to help save […]

Filed Under: IT Infrastructure, News Tagged With: Atera, ChatGPT, OpenAI

These Dangerous Vulnerabilities on CISA’s KEV List Are Still Being Widely Exploited

Despite patches being available for most of the bugs in CISA's Known Exploited Vulnerabilities catalog, many devices remain unpatched.

April 3, 2023 Zachary Comeau Leave a Comment

Log4j, Older Vulnerabilities, CISA KEV

The U.S. Cybersecurity and Infrastructure Security Agency has been keeping an updated list of Known Exploited Vulnerabilities (KEV) that currently includes more than 900 security bugs, with the goal of helping inform organizations about vulnerabilities that should be prioritized. Despite that awareness campaign and emphasis on vulnerabilities that have been exploited in the wild, new […]

Filed Under: IT Infrastructure, Network Security, News Tagged With: CISA, Rezilion, Vulnerability Management

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 27
  • Page 28
  • Page 29
  • Page 30
  • Page 31
  • Interim pages omitted …
  • Page 1393
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.