When your software evolves to a certain state, non-specific hardware can become a hindrance to overall performance. The next logical step is to build custom hardware that creates a fully controlled environment. However, when your engineering process includes components sourced overseas, malicious additions to your component’s firmware can create hardware security threats for you and …
Category: Risk Management
My oldest son recently got an Android powered, 1 GB 3D smartphone. Now why you want a 3D camera and viewing capabilities on a phone, is beyond me. But after he treated me to a free 3D movie and took my picture in 3D, I was smitten. Naturally it led me to investigate the security …
Recently I attended a webinar that discussed the need for a business continuity plan (BCP) in case a pandemic virus was to affect hundreds of thousands, if not millions, of people around the world, possibly in your area. Obviously playing off of the fears from the recent H1N1 (a new flu virus of swine origin …
Recently I was asked by a manager of a local mid-sized company what I thought the benefits were for a business to pursue Green Information Technology. After all, it does cost a lot of money to buy new software and equipment. This got me thinking about just how much we don’t understand the impact of “going green.” So what, …
The Benefits of Green Information Technology SolutionsRead More »