• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: red hat

Proofpoint CISO, CISOs cyberattack

New Ways We Might Get Hacked in 2019

Relying on AI, old and new methods, hackers will be kicking up their attack strategies this year.

January 23, 2019 Jessica Messier Leave a Comment

Relying on AI, old and new methods, hackers will be kicking up their attack strategies this year.

Read More

Google Unified Communications, Google AI

Research Team Tricks Google’s ReCaptcha Using Its Own Services

UnCaptcha’s methods use Google’s own text-to-speech service to fool one of the most popular CAPTCHA services into thinking bots are humans.

January 23, 2019 Sam Harton Leave a Comment

UnCaptcha’s methods use Google’s own text-to-speech service to fool one of the most popular CAPTCHA services into thinking bots are humans.

Read More

School Software Implementation

How Artificial Intelligence is Creating the Netflix Model in Higher Education

Artificial Intelligence is leading to a boon in distance learning, similar to the Netflix model, and it’s a good thing for higher education.

January 23, 2019 Rob Lipps Leave a Comment

Artificial Intelligence is leading to a boon in distance learning, similar to the Netflix model, and it’s a good thing for higher education.

Read More

digital signage

Expand Your Digital Signage Business with Educational Tools

Visix offers four free educational ebooks to help expand and grow your digital signage business.

January 22, 2019 Lisa Montgomery Leave a Comment

Visix offers four free educational ebooks to help expand and grow your digital signage business.

Read More

School Software Implementation

3 Ways Computers Will Run Cool in the Future

Researchers are finding ways to combat heat and energy loss in running computers through new materials, electron transportation, and chip cooling.

January 22, 2019 Jessica Messier Leave a Comment

Researchers are finding ways to combat heat and energy loss in running computers through new materials, electron transportation, and chip cooling.

Read More

Marriott Concedes Failing to Encrypt 5 Million Passport Numbers

Marriott is dealing with the largest data breach in history and admitting to not properly securing passport numbers.

January 22, 2019 Sam Harton Leave a Comment

Marriott is dealing with the largest data breach in history and admitting to not properly securing passport numbers.

Read More

Canon

IRISPowerscan from Canon Poised to Automate Customers’ Business Processes through Enhanced Scanning and Indexing

Canon IRISPowerscan can consolidate and classify information from a variety of different documents.

January 21, 2019 Lisa Montgomery Leave a Comment

Canon IRISPowerscan can consolidate and classify information from a variety of different documents.

Read More

Bose

Bose Gets Into the Connectivity and Communications Business

Acquisition of ZiipRoom folds innovative meeting and conference technology into Bose Professional’s audio business.

January 21, 2019 Lisa Montgomery Leave a Comment

Acquisition of ZiipRoom folds innovative meeting and conference technology into Bose Professional’s audio business.

Read More

facial recognition COVID-19

Facial Recognition Being Embraced by Consumers

National survey finds that few Americans want limits on facial recognition technology.

January 21, 2019 Lisa Montgomery Leave a Comment

National survey finds that few Americans want limits on facial recognition technology.

Read More

Cyber Risk Management: 5 Important Considerations

While there is no magic bullet, these 5 elements are critical to your cyber risk management strategy.

January 21, 2019 Paul Konikowski Leave a Comment

While there is no magic bullet, these 5 elements are critical to your cyber risk management strategy.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 893
  • Page 894
  • Page 895
  • Page 896
  • Page 897
  • Interim pages omitted …
  • Page 1150
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.