• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: microsoft

IpLContent Provides Intuitive Content Layout for Foldable Smartphone Users

May 5, 2022 TechDecisions Staff Leave a Comment

SAN JOSE, Calif.–(BUSINESS WIRE)–Smartphones are constantly evolving, but apps don’t always keep up. Smartphones can display content in portrait or landscape mode, but some apps—like Instagram, Snapchat, or TikTok—only work in portrait mode. If you try to rotate your screen, you’ll just be looking at a sideways app! Users want their apps to provide an […]

Read More

Qumulo Cloud Now

Qumulo Launches Cloud Now Program

Cloud builders can move data to the cloud with one free petabyte of storage with Qumulo's Cloud Now Program.

May 5, 2022 TD Staff Leave a Comment

Qumulo, the Seattle-based data storage and management solutions provider offers cloud builders the ability to create and test up to one petabyte (PB) of multi-cloud file storage. Qumulo’s Cloud Now Program is designed to eliminate barriers to unstructured data storage in the cloud while speeding time to deployment. Customers can now build a proof of […]

Read More

Cybersecurity Consolidation, cyber readiness

Why Soon-To-Be Unsupported Windows 2012 and 2012 R2 Servers Pose Serious Corporate, Personal Risk for Execs

Organizations leveraging Windows Server 2012 and 2012 R2 after Oct 2023 will become vulnerable to cyberattacks and compliance risks.

May 5, 2022 Paul Deur Leave a Comment

Microsoft will officially end extended support for Windows Server 2012 and 2012 R2 in October of 2023, meaning the company will stop providing users with critical security updates and patches. Organizations that continue to leverage Windows Server 2012 and 2012 R2 after this date will become increasingly vulnerable to cyber attack and compliance risks. Any […]

Read More

Poly Hybrid Work

Technology and Understanding Workstyles Will Help Support Hybrid Work

New research from Poly and advice from IT professionals suggests companies need to "lean into technology" to solve their hybrid work issues.

May 4, 2022 Zachary Comeau Leave a Comment

It is now very clear that after two years of working remotely, employees don’t want to go back to the office. However, some executives are forcing the issue, which suggests a massive disconnect between different levels of workers and the need for employers to provide the technology and policies to make hybrid work more equitable. […]

Read More

Araali Networks Selected as Finalist for RSA Conference 2022 Innovation Sandbox Contest

May 4, 2022 TechDecisions Staff Leave a Comment

Araali Networks Recognized for Proactive Risk Mitigation Solution for Cloud Workloads LIVERMORE, Calif.–(BUSINESS WIRE)–#cloudsecurity—Araali Networks Inc., a Cloud Security company, has been named one of 10 finalists for the RSA Conference 2022 Innovation Sandbox Contest for its work providing self-configuring passwordless controls for any cloud, automating least privilege access for apps and proactively blocking threats […]

Read More

Dasera Selected as Finalist for RSA Conference 2022 Innovation Sandbox Contest

May 4, 2022 TechDecisions Staff Leave a Comment

Dasera Recognized for Helping Organizations Operationalize Their Data Governance Programs MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–Dasera, the platform that helps organizations operationalize their data governance programs, has been named one of 10 finalists for the RSA Conference 2022 Innovation Sandbox Contest for its work continually and automatically monitoring context and enforcing data governance policies. On Monday, June […]

Read More

Nucleus Research Releases 2022 iPaaS Technology Value Matrix

May 3, 2022 TechDecisions Staff Leave a Comment

Boomi, IBM, Informatica, TIBCO, Tray.io, and Workato lead the market in delivering outstanding value through integration platform as a service. MIAMI–(BUSINESS WIRE)–#ROI–Nucleus Research found the Integration Platform-as-a-Service (iPaaS) market experienced significant growth during the past 12 months as organizations look to maximize the ROI from their operational data. “Nucleus found that enterprises with sizable IT […]

Read More

Crestron George Feldstein Technology Center with blue and white balloons decorating the front door. There is also a podium in front of the building where a person is holding a mic.

Crestron Dedicates Technology Center to Founder George Feldstein

Named after Crestron’s founder, the George Feldstein Technology Center will house the company's technological innovators and engineers.

May 3, 2022 TD Staff Leave a Comment

Crestron, based in Rockleigh, N.J., unveiled the George Feldstein Technology Center during the last week of April with speeches from president and CEO, Dan Feldstein, and COO, Dan Brady. The building located at 22 Link Drive has been renamed to honor George Feldstein. Feldstein founded Crestron over 50 years ago and paved the way for […]

Read More

IoT Security

This Hacking Group Uses Unsecure IP Camera Systems to Hide From IT

Mandiant says it is tracking a new threat actor that leverages unsecure videoconferencing cameras to hide in victim environments.

May 3, 2022 Zachary Comeau Leave a Comment

Cybersecurity firm Mandiant has published a detailed analysis of a new threat actor that has been observed remaining undetected in victim environments for at 18 months by installing backdoors on IP cameras appliances that do not support security tools and leveraging a large IoT botnet to spy on organizations involved in large corporate transactions. According […]

Read More

Proofpoint CISO, CISOs cyberattack

A NASA-Style Approach to Preventing Supply Chain Attacks in 2022

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks.

May 2, 2022 Vijay Viswanathan Leave a Comment

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks. This is because infiltrating a third-party software provider gives bad actors an avenue to target and access thousands of downstream customers. One of the biggest recent supply chain attacks was on IT management software provider SolarWinds, which saw hackers insert […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 88
  • Page 89
  • Page 90
  • Page 91
  • Page 92
  • Interim pages omitted …
  • Page 193
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.