Category Archives: Security

Write Once, Run Anywhere: The IoT Machine Learning Shift From Proprietary Technology To Data

Write Once, Run Anywhere: The IoT Machine Learning Shift From Proprietary Technology To Data

The IoT Machine Learning Shift While early artificial intelligence (AI) programs were a one-trick pony, typically only able to excel at one task, today it’s about becoming a jack of all trades. Or at least, that’s the intention. The goal is to write one program that can solve multi-variant problems without the need to be…

Why Do Television Companies Need A Digital Transformation

Why Do Television Companies Need A Digital Transformation

Cloud TV Over just a few years, the world of television production, distribution, and consumption has changed dramatically. In the past, with only a few channels to choose from, viewers watched news and entertainment television at specific times of the day or night. They were also limited by where and how to watch. Options included…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

The Future of Cognitive Computing

The Future of Cognitive Computing

Cognitive Computing Recently popularized by IBM’s highly intelligent Watson supercomputer, which competed on the hit game show Jeopardy, cognitive computing refers to machines that are capable of learning concepts and patterns through advanced language processing algorithms. A system that involves incredibly advanced artificial intelligence, cognitive computing is one facet of computer science that isn’t for…

Ouissam Youssef: The Future of Media Investment

Ouissam Youssef: The Future of Media Investment

The Future of Media Investment Sponsored series by the Valsef Group Once upon a time, media was easy to understand. There were printed newspapers, magazines, TV, and radio. Together, they were our exclusive sources of news and entertainment. They had two basic financial models: advertiser-supported free media and subscription media, which included anything that had…

Password Syncing Platforms Frequently Targeted

Password Syncing Platforms Frequently Targeted

Opera Sync Following on the heels of a recent public request by Dropbox that their users change their passwords in response to a 2012 attack that recently turned up more usernames and passwords online, Opera also became a target last week when their browser’s sync service became compromised. While Opera has not released any specifics…

Ensuring Cloud Authorizations Are Correct

Ensuring Cloud Authorizations Are Correct

Cloud Authorization Almost all organizations in every industry now use some type cloud application. This is because of cost, efficiency, ease of use and because many software companies are offering their solutions in the cloud. For example, Microsoft 365 and Adobe Suite are mostly utilized by organizations in the respective cloud versions. Cloud applications have…