I write articles about Windows, IT security, certifications and the like, and develop online and on-ground courses.
An intrinsic cyber resiliency approach to addressing security risks at all levels of the manufacturing IT and OT landscape
The factory floor is a crucial component of any manufacturing operation. It is where raw materials are transformed into finished products, and it is the beating heart of the manufacturing process. However, the factory floor, with a mix of IT and OT systems, is also vulnerable to cyber threats.
How computer vision is revolutionising the manufacturing supply chain
Manufacturing organisations who implement data-driven processes aided by computer vision are finding it easier to navigate uncertainties while staying ahead of demand, writes Jeff Dymond, Global CTO, Industries Edge and IoT, Dell Technologies.
Here's How to Get the Most Out of Autodesk Revit with Twinmotion
Getting the powerful performance needed to transform Autodesk Revit models into a real-time, visually immersive experience with Twinmotion
Container Storage for Dummies
Although many organizations still use traditional storage appliances, they don’t offer the agility needed by containerized environments. Containers are highly flexible and bring incredible scale to how apps and storage are delivered; traditional storage can be the bottleneck that stops this progress. The underlying storage should be highly elastic, easily provisioned by developers and admins, and, ideally, managed using the same orchestration framework (like Kubernetes).
The Future Is Computer Vision – Real-Time Situational Awareness, Better Quality and Faster Insights
Years ago, computer vision was just a clever science fiction innovation, but now it’s a reality that is quickly becoming a part of the enterprise landscape.
In essence, computer vision uses AI and machine learning to make sense of digital video, images, audio and even biometric data, and provides insights and conclusions. With data gathered from both cameras and edge based IoT sensors dotted around a building, campus or an entire city, for example, computer vision technology applies algorithmic models to learn about visual data and turn it into information for decision making.
Unlock The Full Value Of Managed Services For UC&C
You’ve probably been hearing a lot of talk about unified communications and collaboration (UC&C) solutions and the slew of benefits they offer—including improved operational efficiencies, greater business resiliency and more satisfying employee and customer experiences. While the advantages are undeniable, making the switch from legacy voice to a cloud-enabled platform may be too complex to handle on your own. If your organization lacks the skills or resources to tackle the project in-house, consider managed services from a trusted UC&C provider to fill in the gaps.
How to Break up With Your VPN (and Improve Security)
The VPN has been a constant in the life of remote workers for such a long time, it's difficult to imagine another option. If that's true in your organization, you are settling for less than you deserve. This video, developed in conjunction with Zscaler, will explain how you can make a fresh start and improve both the user experience and security.
Computer Vision Is Transforming the Transportation Industry
Computer vision is helping to reshape the transportation industry at every level from streamlining the passenger experience to preemptive fleet maintenance to fuel optimization. As the transportation industry continues to evolve, converging technologies such as 5G and powerful edge compute will enable the next generation of prescriptive and adaptive data-driven outcomes benefiting passengers, the industry and sustainability.
Streamline Your UC&C in 2023 with Lumen® Enablement Services for UC&C
At Lumen, we believe unified communications and collaboration (UC&C) is vital to every business, not just the corporate world. But not every business has enough staff, or staff with the right knowledge and skillsets, to support a full UC&C implementation.
UC&C Considerations for Companies Navigating the Digital Transformation Journey
Recent history ushered in abrupt shifts to how organizations support business operations and where and how their employees work. Digital transformation drivers that existed before the pandemic became critically important almost overnight, resulting in a dramatic uptick in the adoption of unified communications and collaboration (UC&C) to provide the same experience for employees who remained in the office versus those working remotely.
Embracing the Zero Trust Framework
Today's network operations no longer follow the old rules where everything that was enclosed within the network boundaries was assumed to be trustworthy and only external connections were suspect, making things more straightforward to secure. This video will provide agencies with a framework that they can use to ensure that they develop a comprehensive zero trust approach.
How Threat Hunters Use Data Analytics to Shut Down Attackers
Learn how the right data analytics solution can reduce volume and noise, giving threat hunters and analysts the upper hand.
A ‘How to Build the Plane While You Fly It’ Approach to Loan Modernization
Explore a modernization a case study of a federal agency responsible for insuring almost 8 million mortgage loans.
Case Study: How an Ivy League Institution is Revolutionizing the Higher Ed Campus Network
Higher education institutions are under fire to support the plethora of technologies that students, staff, faculty and researchers expect, regardless of where users are on campus and which device they use. To meet demand, educational institutions need a flexible network infrastructure that expands and adjusts to meet ever changing demands and fully embraces modern technologies.
The Vantage Vision for a Modernized Network
Many networks evolve organically. In higher education, universities built their networks in the 1970s and 1980s and have upgraded them in place, often using the same approaches for the last several decades. Although technologies have changed considerably, funding models have lagged, and the lack of a sustainable funding model has resulted in unsustainable levels of deferred maintenance and technical debt that impair institutional success, with IT leaders receiving just enough funding to keep the network running.