Taiwanese chip-making giant Taiwan Semiconductor Manufacturing Co. (TSMC), whose customers include Apple, Nvidia, AMD, Qualcomm, and Broadcom, was hit with a WannaCry infection last weekend that knocked out production for a few days and will cost the firm millions of dollars. Most chip companies are fabless, meaning they don’t make their own chips. It’s a […]
Archives for August 2018
Artificial Intelligence Starts in the IT Department
If you need to show executives and department heads what AI can do for your company, IT automation is a great proof of concept.
An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41
In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.
JDA completes acquisition of Blue Yonder to boost AI tech
News 8 Aug, 2018 Clare Hopping Blue Yonder's AI and machine learning platform will be implemented on top of JDA's supply chain software
Configuring Devolutions Web Login with Devolutions Password Server
Devolutions Web Login (DWL) helps you easily create, securely store and auto-fill your login credentials and passwords to any website directly from your web browser. This video will show you how to set up DWL with Devolutions Password Server in just a few steps. Devolutions Web Login is free to use but does require either […]
Citrix: XenApp & XenDesktop and Third-Party Software in Harmony!
Have you ever wondered what Citrix does to ensure the released versions of XenApp and XenDesktop remain compatible with various third-party software updates from vendors like Microsoft, VMWare, or Adobe? As you may know, our technology leverages, relies upon, inter-operates with, and supports software; such as Microsoft Windows operating systems, Microsoft Office, Microsoft SQL, Microsoft […]
How AI and Intelligent Automation Impact HR Practices
AI and intelligent forms of automation are changing the ways companies operate. HR is no exception. In fact, HR leaders are spearheading automation efforts for their employers.
What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39
What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.
Citrix: Reliable, cost-effective Workspace connectivity – Part 3
In last week’s installment of my blog series on reliable, cost-effective connectivity with Citrix Workspace, we uncovered a multitude of benefits from using Citrix SD-WAN between office locations and the data center VDA (Virtual Delivery Agent) servers used to deliver Virtual Apps & Desktops. This week, let’s look at how those benefits extend to VDAs […]
Apstra Offers Intent-Based Networking Taxonomy and Maturity Model
News Apstra Offers Intent-Based Networking Taxonomy and Maturity Model By David Ramel 08/06/2018 Intent-based networking (IBN) pioneer Apstra has offered up a taxonomy and maturity model for the young, game-changing technology, described by many as the next big thing in the networking industry. The model seeks to objectively define maturity levels of IBN implementations, Apstra […]