Industry News

4 Digital Transformation Success Stories

The 4 Digital Transformation Success Stories of Walmart, Bed Bath & Beyond, and others are steering digital initiatives to drive growth and efficiency.  These real-world transformation examples detail IT…

Microsoft: New phishing attack ‘sneakier than usual’

Microsoft warns phishing attack is ‘sneakier than usual’ Microsoft’s Security Intelligence team has issued an alert to Office 365 users and admins to be on the lookout for a…

Amsterdam Debuts World’s First 3D-Printed Steel Bridge

Amsterdam has debuted the World’s First 3D-Printed Steel Bridge Amsterdam has debuted the World’s First 3D-Printed Steel Bridge! Would you walk across a 3D-printed bridge? For folks in Amsterdam,…

Microsoft: SolarWinds Attack Involved 1,000 Developers

Supply Chain Attack Likely Continues, He Tells ’60 Minutes’ More than 1,000 developers likely worked on rewriting code for the massive SolarWinds supply chain attack that affected many companies…

Artificial Intelligence: Examples of How to Start Successfully

  Some important pieces of advice for starting an AI project at your business: 1) Bigger isn’t better. 2) Start with your data. You may be tempted to dive…

Inside a GandCrab Targeted Ransomware Attack on a Hospital

  A recent attack on a US hospital gives us a colourful picture of both how a targeted ransomware attack happens, and how it can be stopped.   Just…

“Simple trick” Gives Anyone Access to Home Security Camera

  A Few Weeks Ago, a Headline Popped Up that Caught the Eye of… …Security Researchers:  “Swann home security camera sends video to wrong user”. It was clear what happened: the…

Smart road technology could turn highways into crash-sensing ‘touchpads’

  Colorado to test sensor-studded pavement along dangerous stretch of Highway 285 They’re called smart roads: highways studded with sensors that monitor wear and tear and “feel” vehicles like…

Medical Device Security: Hacking Prevention Measures

  With so many lives at stake, computer scientists and healthcare IT pros… …are motivated to develop strategies that keep patients safe from medical device hackers. They’re making progress….

Explore IBM Power9 – Power System H924 & H922

 Next gen POWER9-based IBM Power Systems: designed for cloud deployments With built-in PowerVM virtualization, these servers enable clients to build a cloud any way they want to—private, hybrid or…

FBI Warns of Increasing Ransomware, Firmware Attacks

 It’s not just your IT shop giving you these warnings! Ransomware, insider threats, and attacks on firmware and hardware are growing cyberthreats, reports an FBI spokesperson. Corporate IT systems…

IBM’s new Power9 chip was built for AI and machine learning

 IBM’s new POWER9 Chip was Built for AI and Machine Learning In a world that requires increasing amounts of compute power to handle the resource-intensive demands of workloads like…

Introducing IBM Hyperconverged Systems powered by Nutanix

Introducing IBM Hyperconverged Systems powered by Nutanix – watch and seize the cognitive advantage HERE.  Don’t compromise server performance for ease of use. Get the proven performance of the IBM…

Intel Will No Longer Provide Per-Core Turbo Frequencies, Making Motherboard Tuning Impossible

Intel’s Coffee Lake Core i7-8700K has launched, earning our top CPU recommendation at its price point. But there’s one issue worth being aware of going forward: Intel has declared that…

NVIDIA CEO Kicks Off Global GTC Tour, Unveiling AI Tools and Partnerships in China

FIVE MAJOR ADVANCEMENTS IN AI As the AI revolution gains momentum, NVIDIA founder and CEO Jensen Huang took the stage last Tuesday in Beijing to show the latest technology…

Veeam + Cisco: Reliable Data Protection Designed for Virtualized Environments

Together, Veeam® and Cisco deliver fast, efficient disaster recovery (DR) for your Always-On Enterprise™. See how you can achieve recovery times and point objectives (RTPO™) of <15 minutes for ALL applications and data with Veeam Backup & Replication, powered…

U.S. Government Accountability Office: 24 Agencies Still Struggle With IT Security Weaknesses

 HHS, NASA, OPM, IRS Among Agencies Criticized Two dozen federal agencies continue to experience security weaknesses in five critical areas, which puts government systems and data at risk, according…

Tip Card – GOVERNMENT

 Stop. Think. Connect. Government Resources NCSAM was created to ensure Americans have the resources to stay safe and more secure online, every day. The collaboration between the U.S. Department…

DISCOVER A SMARTER SOLUTION TODAY

Events + Press

Blogs

Case Studies

Research Downloads

Videos

Industry News