Artificial Intelligence and Its Impact on Privacy

Artificial Intelligence

With the development and integration of artificial intelligence (AI) into our daily lives, ethics and bias quickly become main concerns. Both ethics and bias also make implementing artificial intelligence in a practical sense that more complicated. Whose definition of what is ethical are corporations programming their AI systems to default to? It’s highly unlikely that there will be a standard answer to this question across companies, industries and countries; especially considering the lack of diversity in the AI design world.  Read more +

Thinking Outside the Box: Document Management for Law Firms

Law firms of all sizes rely heavily on the ebb and flow of documents to successfully manage client matters. With several tools on the market that claim to meet the needs of your law firm, we will investigate the two top contenders that lead the way to successful document management. Read more +

Smart Phone Water Resistance Claims

water resistant claims

Water resistant claims are heavily emphasized in marketing campaigns for today’s most popular smartphones and fitness trackers. But how trustworthy are their claims? As with any new technology purchase, it’s important to delve beyond the pretty packaging and assertions,  and get down to the facts. Read more +

What to Expect With Windows Server 2016

windows server 2016

Windows Server 2016 , the “cloud-ready OS”, becomes available for general use as announced this week at Microsoft’s Ignite conference. Volume licensing customers will be able to download the fully licensed software in mid-October. Those who choose to leverage the new features, will notice enhanced security and management features that can simplify server management for businesses of any size. Since migrating server operating systems is not a simple undertaking, you’ll need to evaluate if it is indeed something your business needs to consider. Read more +

Smartwatch for Business Users

Smartwatch shipments are projected to reach 110 million units by the end of 2016 (this according to IDC).  As is the case with several other technology products that are aimed at the consumer market, it will only be a matter of time before it impacts how we conduct business. When considering whether a new device may be beneficial to an individual or workplace, it is important to explore the impact it will have on the security of information being processed and utilized. Read more +

Everything You Need to Know About Solid State Drives

As your organization grows, so too well its reliance on e-mail, shared files, and the need to store data from critical applications. Understanding what data storage capabilities and options your business will benefit most from, is an important first step in ensuring optimal performance. Read more +

Two-Factor Authentication: How Safe is Too Safe?

2FA

Two Factor Authentication is an extra security method that can be implemented to ensure specific online applications and services are fully protected.  With recent password hacks and well publicized security breaches happening to companies small and large it aims to protect your network from phishing attacks and stolen credentials. Two factor authentication can be used as a proposed solution, but how safe is too safe? Read more +

Dangers of a Bug Bounty

bug bounty

Bug bounties have good intentions but in a world where cyber warfare is a reality, it can lead to complex consequences were ethics and espionage come into play. When private companies compete to outbid each other’s bounties, it can create a dangerous playing ground that could potentially put million’s of users sensitive information at risk. Read more +

Open Source Contributors and the Free Riders Who Love Them

open source

The Open Source community has been integral to the advancements we’ve seen in technology. Since enabling technology is essential to your business, it may be time to think further about how these tools are created, who profits, who contributes and more importantly, who doesn’t. Read more +

DNS and the Power Behind the Internet Naming System

internet

The internet is a global resource for billions of users. It is what almost all of us now rely on for economic development,  political organizing and free speech communications. Come October, the US department that has controlled a critical internet process since the internet was created, will no longer do so. It’s no wonder in this politically heightened atmosphere, there would be some major concern regarding this shift in who holds the power of the internet. For those concerned about freedom of speech, freedom of press and freedom of knowledge we’ve broken down what there is to know before the power changes hands.  Read more +

3
8