Video and police body cameras: Answers to 6 common questions

NetApp on police body camerasThere are roughly 18,000 police agencies in the United States and they’re all trying to solve the same case: How to deal with the storage requirements of video taken with body cameras.

As adoption of police body cameras rises, small agencies (less than 100 officers) and large metropolitan and state-wide departments (more than 250 sworn officers) all struggle with uploading, categorizing, managing, and storing video evidence. From an on-the-street encounter to a drunk driver arrest, the video evidence taken with these body cameras is generating plenty of data.

This storage conundrum elicits many questions from police agencies nationwide. Here are six common questions we get from police chiefs about video storage and evidence collection, and how to solve the challenges of this new ocean of digital evidence. Continue Reading…

Tags: , , ,

Staff picks for the week of May 23, 2016

Staff Picks GeneralBefore you pack up and hit the road for Memorial Day weekend, take a look at our top tech picks for this week!

Boom makes your music sound boomin’ and/or slammin’ (Read by Camillia S.)

If you’re an audiophile, then this is the app for you. Boom for iOS adds some surround-sound quality to those flat MP3 music files on your phone. Instead of playing music through the Music app on the iPhone, you play it through Boom, which gives you a selection of effects including “3D surround sound simulation” and other boosters. If you’re like me and have been struggling to find a decent pair of headphones without having to shovel out a ton of money, then this app may be worth a try. Continue Reading…

Tags:

How one health care provider learned that compliance does not equal security

Health care compliance and securityWhich causes business leaders to buy into an IT security assessment quicker: ransomware or a data breach?

Both.

Unfortunately, that’s just the situation a regional health care provider network faced a few years ago. Although the IT staff knew a review of the security of the network and file server was overdue, the C-suite remained focused on existing HIPAA compliance guidelines.

That’s when a ransomware attack hit, resulting in a data breach. A user simply clicked on a popup, ransomware was then installed on the machine, and health care records stored on the user’s hard drive were compromised.

After the breach was fixed and the damage assessed, management realized many questions needed answering: Why did this attack happen? What should be IT’s first step in protecting data? What data should be secured? How could the organization balance compliance and security to stop attacks in the future? Continue Reading…

Tags: , , ,

How small businesses can ensure security in the cloud

Trend Micro SaaS vs. securityThe small and medium-sized business (SMB) landscape is defined by its competitiveness. These dog-eat-dog dynamics force business leaders to trim costs, improve worker productivity, and create new, sustainable business models. That’s why almost 90 percent of businesses want a cloud environment and adoption is expected to double in the next four years.

But many small business owners remain on the sidelines, wondering if moving some processes and applications to the cloud is worthwhile. And many of the businesses moving to software-as-a-service (SaaS) solutions are making the same mistake, regardless of the industry: failing to improve their cloud security. Though we’ve come a long way in terms of protecting the cloud, risks always exist.

For some, SaaS might not even be necessary, and you won’t have to worry about the risks. But if you use SaaS applications or are considering them, an additional security layer on top of the built-in controls of your SaaS solution is smart thinking. Continue Reading…

Tags: , , ,

Staff picks for the week of May 16, 2016

Staff Picks GeneralHappy Friday! This week we’re talking origami robots, the benefits of buying used electronics, and more. Wrap up your week by checking out what’s new in technology with our staff picks!

Origami robot may operate from inside the body (Read by Camillia S.)

A tiny, foldable robot made out of dried pig intestine will soon be able to operate from inside the body — untethered. It’s swallowed as a capsule, which dissolves to allow the origami robot to unfold and get to work. Researchers are expecting the robot to be able to repair wounds or remove small objects that were accidentally swallowed. The demonstration looks like a Lego being jostled around a cavity, but is interesting nonetheless. If any advancement in science can help alleviate doctors’ stress and give them more time to tend to life-threatening matters, then I’m all for it! Continue Reading…

Tags:

Is your school building the classroom of the future today?

Classroom of the futureYou probably learned every organ in the body from a textbook, and your grade depended on recalling what the pancreas does and the difference between the large and small intestines. It’s fair to say that times have changed.

In classrooms across America, teachers are presenting subjects in new ways and students are immersing themselves in individually crafted lessons due to the widespread adoption of smartphones and tablets and the introduction of virtual reality (VR) and other technologies. Thanks to the advent of these technologies, teachers have changed the classroom environment to accommodate their students’ learning preferences.

What some might think of as “the classroom of the future” is already here. Here are three tech trends many schools are adopting that will shape the classroom of the not-too-distant future: Continue Reading…

Tags: , , , ,

How the Internet of Things is driving cost-saving efficiencies for manufacturers

Cisco Internet of Things for ManufacturingIf there’s one industry that demands efficiency, it’s manufacturing. Lined with robots and skilled workers side by side, modern assembly lines pump out millions of goods every year at record speeds. But nearly every line will experience maintenance shutdowns, can improve flow, and can correct designs and oversights.

Manufacturers are now combating those challenges with Internet of Things (IoT) devices that can bring about big results through data collection. In fact, 61 percent of North American manufacturing executives said they’d be willing to use IoT devices to monitor equipment for predictive maintenance services.

This is the next step in the evolution of industry, which has come a long way from the steam-powered 18th century. The mass production of the 20th century and the advent of robots in the 1970s sped production lines, and now those tools are getting smart. The digitization of manufacturing means smart devices and technological progress that’s opening new opportunities.

Welcome to Manufacturing 2.0, where IoT devices are boosting productivity, improving efficiency, and putting money into manufacturers’ pockets. Continue Reading…

Tags: , ,

Staff picks for the week of May 9, 2016

Staff Picks GeneralHappy Friday! Wrap up your week by checking out what’s new in technology with our staff picks!

These grad students didn’t know their teaching assistant was a robot (Read by Camillia S.)

I completed my grad school education last year, and after reading this article, I’m wondering if one of my online course instructors had some robotic assistance as well. Grad students at Georgia Tech were floored when they found out the teaching assistant (TA) they had been interacting with, named “Jill Watson,” was a robot created on the IBM Watson platform. The professor already had eight TAs, but with 300 students every semester and a whopping 10,000 messages in the online forum, the team needed a hand. A virtual one. This is just one more example of how AI is impacting our lives and how it’s here to stay. Continue Reading…

Tags:

The clock is ticking: Are you ready for Microsoft’s Volume Licensing transformation?

Microsoft licensing changesWith only two months left in Microsoft’s Fiscal Year ending June 30, you’re probably wondering why I’m writing a blog post now on Microsoft’s Volume Licensing (VL) transformation. Change is constant in Microsoft licensing, so a firm understanding of Microsoft’s plans to transform its VL models and platforms will be integral to your current and future decision-making process on the acquisition and consumption of software and services.

Let’s dissect the three changes that will have an immediate impact on how commercial organizations acquire Microsoft products moving forward. Continue Reading…

Tags: , , , , ,

Why it’s time for spring cleaning of your data preparation process

Datawatch clean your dataIBM estimates that 2.5 quintillion bytes of data are created each day. Of course, your organization produces just a small fraction of that total amount, but it’s the most important data for your business analysts.

Unfortunately, finding what’s important is a major time drain. Data analysts spend 80 percent of their time manually sorting through data to compile spreadsheets. They’re copying and pasting data from one document to another, and building micros and formulas to process complex numbers. Most of this brute force work is time-consuming, expensive, and inefficient; manually preparing, cleaning, and consolidating data from different sources is a near-impossible task, not to mention the potential for error or bias.

Clean, accessible data is no longer a “nice to have,” but a critical business asset that drives compliance in the health care field, for example. The more data an organization collects from disparate systems and applications, the more complicated it becomes to process into clean, easily digestible spreadsheets. All organizations face data challenges, but enterprise organizations in particular are dealing with terabytes of disparate data from a variety of sources, both internal and external. Continue Reading…

Tags: , ,
Test de Penetrare, Scanare de Vulnerabilitati, MoldovaTeste de Penetrare, Scanari de Vulnerabilitati, MoldovaPenetration Testing Moldova, Penetration Test Moldova, LogicalPoint