dcsimg

Blogs

 

5G in 2019: Are We There Yet and Will It Be Secure?

29 Jan, 2019

5G will likely be a powerful asset to business operations, but is your security going to be able to keep up with it? More >

Cinnamon AI Employs Machine Learning Algorithm to Digitally Convert Documents

29 Jan, 2019

Converting documents into a digital format has become a much bigger concern as organizations invest in the development of various types of AI models to automate business processes. More >

Expect to Hear More About Open Source’s Role in Security

18 Jan, 2019

Watch to see if strategic acquisitions and enterprise turning to open source to address security ends up as a trend in 2019. More >

All Blogs
Arthur Cole

Why Security Needs to Automate, Too

Infrastructure  RSS |  Arthur Cole   |  15 Feb, 2019

The same tools being used to augment the development and operations side of the house can also be applied to automation in security.... More >

0 Comment

Mike Vizard

Marconi Employs Blockchain Technologies to Create Network Overlay

IT Unmasked  RSS |  Mike Vizard   |  31 Jan, 2019

The Developer Test Network provides developers with a sandbox where they can develop applications on top of a network overlay based on the Marconi Protocol.... More >

0 Comment

Rob Enderle

The Most Troubling Part of the FTC Case Against Qualcomm

Unfiltered Opinion  RSS |  Rob Enderle   |  31 Jan, 2019

Attending the final hours of this FTC trial raised several serious and troubling questions about this proceeding and future ones among tech companies and government agencies.... More >

0 Comment

Sue Marquette Poremba

5G in 2019: Are We There Yet and Will It Be Secure?

Data Security  RSS |  Sue Marquette Poremba   |  29 Jan, 2019

5G will likely be a powerful asset to business operations, but is your security going to be able to keep up with it?... More >

0 Comment

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.