Monthly Archives: August 2015

Are You at Risk with the Government for Sloppy Cybersecurity?

Court: FTC can bring down the hammer on companies with sloppy cybersecurityHotel chain Wyndham had challenged the FTC's authority to mandate cybersecurity standardsThe U.S. Federal Trade Commission has the authority to take action against companies that fail to protect customer [...]

Are You at Risk with the Government for Sloppy Cybersecurity? 2017-05-25T15:17:58+00:00

This just in on Apple Watch Sales at #2

In my household we have purchased three Apple Watches.  I like mine, but it does have a few quirks.  It is in the first generation so that is to be expected. 3.6 million Apple Watches shipped in Q2 2015, says [...]

This just in on Apple Watch Sales at #2 2017-09-18T00:41:58+00:00

Oli Thordarson and The VAR Guy on “Cyberthreats: Worse Than Anyone Thinks”

The potential for a cyberattack is top of mind for not just IT professionals and CIOs but also among the general population. Experts—from government agencies to technology experts—have been warning that this year will see the worst cyber breaches in [...]

Oli Thordarson and The VAR Guy on “Cyberthreats: Worse Than Anyone Thinks” 2017-06-29T20:50:05+00:00

Will the Lowly Battery Finally Get a Moore’s Law Upgrade?

Battery technology has not kept up with computing power, storage densities and communication speed increases that all follow something similar to Moore’s Law that states computing power will double every 18 months.  The sad truth is that batteries have not really come very far in 50 plus years.  Alternatives are needed whether it is your iPhone or a Tesla.

Will the Lowly Battery Finally Get a Moore’s Law Upgrade? 2015-08-26T00:27:03+00:00

Joe Stangarone on Nine Common Enterprise Cybersecurity Myths

I like to read mrc's Cup of Joe Blog by Joe Stangarone.  This week I had the honor of being part of his blog 9 common enterprise cybersecurity myths.  This week Joe gets insightful commentary from nine experts to bust some of [...]

Joe Stangarone on Nine Common Enterprise Cybersecurity Myths 2015-08-04T16:12:58+00:00