Welcome to My TechDecisions Week in Review, where we round up the most important stories you might have missed this week, September 2nd – 6th, 2019. Read on to find out what’s happening this week:
Featured:
Castaway Restaurant Displays & AV are Easily Adjusted by Staff
Castaway bar and restaurant’s new restaurant displays and AV system lets employees easily interact with the technology, care of smart integration.
K-12 Education Technology: 5 Must-Have Elements of AV Tech
Here are the most relevant k-12 education technological standards for creating optimal learning environments for students.
SEO for eCommerce Organizations: A Primer
Everything you need to know about eCommerce SEO strategies: It’s just as much of an art form as it is a science (but here’s how to master the science).
Blogs:
3D Printed Coral Reefs Could Solve an Urgent Problem
3D printed coral reefs are being used to attract fish to reefs which are failing to regenerate. The hope? That biodiversity will help bring them back.
Ultra-Secure ‘Quantum Internet’ is Now More Possible Than Ever Before, Thanks to the Qutrit
Quantum data transfer research has reached a new level of progress by using the qutrit, a unit which is capable of carrying even more information.
Who Got Hacked This Week? September 2 Edition
What types of cyberattacks were carried out this week, September 2, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.
Posts:
Education Technology Insights: Study Says 4 out of 5 Educators & Parents Believe Tech Helps Kids Learn
Here are some education technology insights from a Consumer Technology Association study, which shows that most educators believe classroom tech has value.
The ‘World’s First Iron-Ion Battery’ Now Exists, Though It Needs More Development
“World’s first” iron-ion battery is developed by a tech research team in India. But in its current state, it’s only about half as powerful as lithium-ion.
Trustwave Fusion Platform Redefines Cloud-Based Cybersecurity
Trustwave Fusion, a cloud native platform, provides visibility over how security resources are provisioned, monitored and managed across any environment.
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!
Leave a Reply