Search This Blog

Monday, 27 July 2020

Tech News Flash

The Essential Need for 5G in the COVID World
Our infrastructure wasn't set up to suddenly shift massive amounts of traffic from companies to homes. Exacerbating this are cable networks with shared capacity because they were built with the idea that most folks wouldn't be using them at the same time. 5G might be the only realistic way to deal with these issues on a sustained basis.
The Case Against Full-Disk Encryption
The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption. This is the encryption that ensures that someone who snatches your device won't be able to access everything you've saved on it. Jonathan Terrasi on LinuxInsider makes the case that most of you are better off not using it.
Beware of Counterfeit Network Equipment
Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity firm F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X series switches. The report highlights challenges facing organizations that discover counterfeit devices in their IT infrastructure.
US Cloud Gaming Subscriptions Target $3B
Consumer interest in cloud gaming could boost annual subscription revenues to nearly $3 billion, according to Parks Associates. The firm's research report notes renewed interest in services that can stream over the Internet and deliver games to multiple platforms without downloads or taxing local processing power. 
Windows 10X to Eliminate Onboard 32-Bit Apps: Report
Microsoft seems poised to use the OS to power laptop competitors to Google's highly successful Chromebook portables. Absent however is ContainerOS, the technology used to run 32-bit Windows applications under Windows 10X, according to a report.
The Past, Present and Future of Attribute-Based Encryption
That padlock in the address bar of the website you're visiting represents the 's' after 'http' -- which stands for the latest version of Transport Layer Security. Together with Secure Sockets Layer, which TLS replaced, these digital security technologies allow encrypted communication between two parties, such as web sites or servers, and web browsers. Like the Internet itself, these technologies were breakthroughs when conceived.
Why Microsoft Teams Will Be the De Facto Standard for Video Collaboration
Videoconferencing has been an exciting and somewhat painful technology to watch because it seemed like everyone in the segment fundamentally didn't understand that if you don't have interoperability and didn't focus on ease of use, it wouldn't work. Rob Enderle looks at why Microsoft Teams is trending to be the new standard for video collaboration.
TRENDING ON TECHNEWSWORLD
Tech's Role in the Future of Health and Public Safety

Digital technologies can help shift health and public safety agencies from a "detect and respond" approach to a "predict and prevent" stratagem. They can also set the stage for a more connected and data-led approach through robust cybersecurity.

Read more
www.technewsworld.com
Google Clamps Down on Ads for Spyware, Stalkerware

Advertising for software and hardware designed to stalk and spy on people will soon be banned on Google. The ban doesn't include advertising for private investigation services or products designed for parents to track or monitor children.

Read more
www.technewsworld.com
FEATURED RESOURCES
Master of Science in Information Technology

The University of Cincinnati online program is ranked 10th in the country by U.S. News & World Report (2020). Enjoy the flexibility of a schedule built for working professionals. Learn from educators with decades of experience in the field of IT.

Read more
online.uc.edu
Women in Tech: 20 Trailblazers Share Their Journeys
Successful women in the tech trenches share their insights and tackle subjects ranging from how to search out a strong mentor to how to be one -- from how to advance in a large company to how to start your own firm.

This book is an excellent guide for students considering STEM courses, graduates pondering job choices, and career changers at any stage in life. It's also a useful tool for school and career counselors, recruiters, and HR pros eager to diversify their workplaces. 
READER SERVICES
News Alerts
Get the day's top e-business and technology news from ECT News Network delivered to your inbox as stories break. Sign up today.
Feedback
We welcome your feedback. To share your thoughts or ideas, please use our online form.
Manage Subscriptions
This newsletter was sent in response to your request on an ECT News Network website. To update your settings, or to receive other newsletters from ECT News Network: Manage My Subscriptions.
BUSINESS SERVICES
How to Advertise
To advertise in this newsletter or elsewhere on ECT News Network, please call our sales department (818) 461-9700 or follow these links:

No comments:

Post a Comment