• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: LED

Shure Stem Ecosystem

Shure: Democratizing Conferencing Hardware With The Stem Ecosystem

Audio solutions maker Shure wants to help make conference room audio simpler to deploy, manage and use with the Stem Ecosystem.

June 5, 2023 Dan Ferrisi Leave a Comment

Editor’s note: A version of this article originally appeared on our sister site Commercial Integrator.  Back in May, during a trip to Shure’s headquarters in the Chicagoland area, I had an opportunity to immerse myself in the Shure Stem Ecosystem. Shure acquired Stem Audio back in November 2020, bringing into its fold a company that […]

Read More

NSA Programming Languages

The Cyberattacks and Insider Threats During The Development of China’s C919 Passenger Jet

As China celebrates the first commercial flight of its C919 jet, we look back at allegations of hacking and insider threats during its development.

June 5, 2023 Zachary Comeau Leave a Comment

Over the weekend, China claimed a major win by launching the first commercial flight of the C919, the country’s first domestically manufactured large passenger jet built by the Commercial Aviation Corporation of China (COMAC). However, some non-China-based aviation manufacturers and cybersecurity firms may opt to use the term “domestically manufactured” loosely. According to CNN, the […]

Read More

Adwise employee working in hush pod

Adwise Transforms Workplace with Hush Pods & Google Meet Series One Desk 27 by Avocor

Hush pods coupled with Google Meet Series One Desk 27 by Avocor create an all-in-one hybrid workspace solution for Adwise.

June 5, 2023 TD Staff Leave a Comment

Hush pods coupled with Google Meet Series One Desk 27 by Avocor create an all-in-one hybrid workspace solution for Adwise.

Read More

InfoComm Logo

InfoComm 2023 Show to Spotlight Emerging Technologies

InfoComm 2023 will spotlight emerging technologies ranging from augmented and virtual reality to AI and virtual production.

June 2, 2023 Alyssa Borelli Leave a Comment

AVIXA, creator of InfoComm 2023, announced the show will put the spotlight on emerging technologies, from augmented and virtual reality to AI and virtual production. Here, experts will dive into these topics in the vast education program while solution providers will showcase the technology in action on the trade show floor. InfoComm 2023 takes place […]

Read More

MOVEit vulnerability, zero-day, Progress Software

Act Now: Vulnerability in Progress Software’s MOVEit Transfer Software

Cybersecurity researchers are sounding the alarm on a new zero-day vulnerability in Progress Software’s MOVEit Transfer solution.

June 2, 2023 Zachary Comeau Leave a Comment

Cybersecurity companies and researchers are sounding the alarm on a new zero-day vulnerability in Progress Software’s MOVEit Transfer solution, with attackers pouncing on the vulnerability since it was disclosed by Progress Software on May 31. According to Progress Software, the vulnerability in MOVEit Transfer could lead to escalated privileges and potential unauthorized access to the […]

Read More

iPhone security bug, Apple, Kaspersky

Kaspersky Discovers New 0-Click iOS Exploit

Russia-based cybersecurity firm Kaspersky warns of new 0-click exploit targeting Apple iOS devices as Russia accuses NSA.

June 1, 2023 Zachary Comeau Leave a Comment

Cybersecurity firm Kaspersky says it is investigating “previously unknown” malware targeting the company’s own employee’s Apple iOS devices that can compromise devices via the iMessage service with an attachment without any user interaction. According to Kaspersky, the message triggers a vulnerability that leads to code execution, and the code within the exploit downloads several subsequent […]

Read More

FTC Ring

FTC Accuses Ring of Watching Private Videos, Poor Security Practices

The FTC has charged Ring with compromising its customers’ privacy and failing to implement basic privacy and cybersecurity protections.

June 1, 2023 Jason Knott Leave a Comment

The Federal Trade Commission (FTC) has charged Ring with compromising its customers’ privacy by allowing any employee or contractor to access consumers’ private videos and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers’ accounts, cameras, and videos. While the FTC only mentions consumer customers, Ring does offer commercial security […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

New Email Rules, MFA Bypass Are Top Hacking Tactics So Far in 2023

Cybersecurity firm Expel's 2023 first quarter threat report finds that hackers are hiding their activity with email rules and bypassing MFA.

June 1, 2023 Zachary Comeau Leave a Comment

Account compromise, new inbox rules designed to hide malicious activity, and multifactor authentication bypass are the most popular hacking tactics being utilized by threat actors so far in 2023, according to a new report from cybersecurity firm Expel. According to the managed detection and response provider, identity-based attacks such as account compromise, account takeover and […]

Read More

Data, Hitachi Data Reliability Engineering, DRE

Hitachi Vantara Introduces Data Reliability Engineering Services to Optimize Data Ecosystems

Hitachi launches Hitachi Data Reliability Engineering to help organizations improve the quality and consistency of business-critical data.

May 30, 2023 Zachary Comeau Leave a Comment

Hitachi Vantara, the data management and digital solutions subsidiary of Hitachi, is launching Hitachi Data Reliability Engineering, a new suite of consulting services designed to help organizations improve the quality and consistency of business-critical data. This comes as organizations are struggling with the increasing complexity of data and IT environments, connected devices, and applications, in […]

Read More

Digital transformation technology strategy, digitization and digitalization of business processes and data

Five Key Topics for Digital Transformation in Manufacturing Companies

Improve manufacturing efficiency, productivity and CX by integrating digital tech. Learn five key considerations for a successful digital transformation strategy.

May 30, 2023 Alexander Paulus Leave a Comment

Digital transformation is the key to unlocking the full potential of manufacturing companies in the 21st century. By integrating digital technology into all aspects of manufacturing, companies can fundamentally change how they operate and deliver value to their customers. This shift has become especially essential in manufacturing, where customer experience and flexibility are taking center […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 32
  • Page 33
  • Page 34
  • Page 35
  • Page 36
  • Interim pages omitted …
  • Page 849
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.