• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: microsoft teams

Red Hat Summit, AI, Enterprise Linux

Red Hat Announces Red Hat Enterprise Linux 9

Red Hat says its Enterprise Linux 9 platform is designed to drive more consistent innovation across the open hybrid cloud.

May 10, 2022 Zachary Comeau Leave a Comment

Red Hat has announced Red Hat Enterprise Linux 9, a new version of its Enterprise Linux offering, designed to drive more consistent innovation across the open hybrid cloud. The platform, which will be generally available in the coming weeks, is said to be built to “drive enterprise transformation in parallel with evolving market forces and […]

Read More

Xilica Sennheiser Room Kit

Xilica and Sennheiser Partner to Offer Hybrid Conferencing Kits for Medium, Large Rooms

Xilica Sennheiser Room Kits leverage IT infrastructure and PoE-powered audioconferencing solutions in one compact in-ceiling system.

May 10, 2022 TD Staff Leave a Comment

Xilica and Sennheiser have strengthened their partnership through the launch of two new pre-validated, plug-and-play “room kits” for medium and large collaboration spaces. The room kits, designed with IT standards in mind, bring premium PoE-powered Xilica and Sennheiser audio conferencing solutions together in one compact in-ceiling system, with all components connected over CatX network cable. […]

Read More

Cybersecurity Consolidation, cyber readiness

Why Soon-To-Be Unsupported Windows 2012 and 2012 R2 Servers Pose Serious Corporate, Personal Risk for Execs

Organizations leveraging Windows Server 2012 and 2012 R2 after Oct 2023 will become vulnerable to cyberattacks and compliance risks.

May 5, 2022 Paul Deur Leave a Comment

Microsoft will officially end extended support for Windows Server 2012 and 2012 R2 in October of 2023, meaning the company will stop providing users with critical security updates and patches. Organizations that continue to leverage Windows Server 2012 and 2012 R2 after this date will become increasingly vulnerable to cyber attack and compliance risks. Any […]

Read More

Poly Hybrid Work

Technology and Understanding Workstyles Will Help Support Hybrid Work

New research from Poly and advice from IT professionals suggests companies need to "lean into technology" to solve their hybrid work issues.

May 4, 2022 Zachary Comeau Leave a Comment

It is now very clear that after two years of working remotely, employees don’t want to go back to the office. However, some executives are forcing the issue, which suggests a massive disconnect between different levels of workers and the need for employers to provide the technology and policies to make hybrid work more equitable. […]

Read More

Araali Networks Selected as Finalist for RSA Conference 2022 Innovation Sandbox Contest

May 4, 2022 TechDecisions Staff Leave a Comment

Araali Networks Recognized for Proactive Risk Mitigation Solution for Cloud Workloads LIVERMORE, Calif.–(BUSINESS WIRE)–#cloudsecurity—Araali Networks Inc., a Cloud Security company, has been named one of 10 finalists for the RSA Conference 2022 Innovation Sandbox Contest for its work providing self-configuring passwordless controls for any cloud, automating least privilege access for apps and proactively blocking threats […]

Read More

Dasera Selected as Finalist for RSA Conference 2022 Innovation Sandbox Contest

May 4, 2022 TechDecisions Staff Leave a Comment

Dasera Recognized for Helping Organizations Operationalize Their Data Governance Programs MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–Dasera, the platform that helps organizations operationalize their data governance programs, has been named one of 10 finalists for the RSA Conference 2022 Innovation Sandbox Contest for its work continually and automatically monitoring context and enforcing data governance policies. On Monday, June […]

Read More

Nucleus Research Releases 2022 iPaaS Technology Value Matrix

May 3, 2022 TechDecisions Staff Leave a Comment

Boomi, IBM, Informatica, TIBCO, Tray.io, and Workato lead the market in delivering outstanding value through integration platform as a service. MIAMI–(BUSINESS WIRE)–#ROI–Nucleus Research found the Integration Platform-as-a-Service (iPaaS) market experienced significant growth during the past 12 months as organizations look to maximize the ROI from their operational data. “Nucleus found that enterprises with sizable IT […]

Read More

Crestron George Feldstein Technology Center with blue and white balloons decorating the front door. There is also a podium in front of the building where a person is holding a mic.

Crestron Dedicates Technology Center to Founder George Feldstein

Named after Crestron’s founder, the George Feldstein Technology Center will house the company's technological innovators and engineers.

May 3, 2022 TD Staff Leave a Comment

Crestron, based in Rockleigh, N.J., unveiled the George Feldstein Technology Center during the last week of April with speeches from president and CEO, Dan Feldstein, and COO, Dan Brady. The building located at 22 Link Drive has been renamed to honor George Feldstein. Feldstein founded Crestron over 50 years ago and paved the way for […]

Read More

IoT Security

This Hacking Group Uses Unsecure IP Camera Systems to Hide From IT

Mandiant says it is tracking a new threat actor that leverages unsecure videoconferencing cameras to hide in victim environments.

May 3, 2022 Zachary Comeau Leave a Comment

Cybersecurity firm Mandiant has published a detailed analysis of a new threat actor that has been observed remaining undetected in victim environments for at 18 months by installing backdoors on IP cameras appliances that do not support security tools and leveraging a large IoT botnet to spy on organizations involved in large corporate transactions. According […]

Read More

Proofpoint CISO, CISOs cyberattack

A NASA-Style Approach to Preventing Supply Chain Attacks in 2022

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks.

May 2, 2022 Vijay Viswanathan Leave a Comment

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks. This is because infiltrating a third-party software provider gives bad actors an avenue to target and access thousands of downstream customers. One of the biggest recent supply chain attacks was on IT management software provider SolarWinds, which saw hackers insert […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 52
  • Page 53
  • Page 54
  • Page 55
  • Page 56
  • Interim pages omitted …
  • Page 82
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.