Christmas Gifts, New Gadgets Can Compromise Your Online Security, Safety
by Lee Rickwood
Yes, even Christmas lights themselves – accessed through a connected smartphone and mobile app – can compromise your online safety, security and privacy.
by Lee Rickwood
Yes, even Christmas lights themselves – accessed through a connected smartphone and mobile app – can compromise your online safety, security and privacy.
by Lee Rickwood
A Toronto-based company has developed a high-tech surgical planning platform that combines navigation, visualization and informatics tools in an integrated system that’s used before, during and after surgery.
By Christine Persaud
If you’re a business start-up, chances are you don’t have tons of money to spare on sophisticated local back-up storage, or remote servers. And even so, using the cloud can also be a great secondary safeguard for your sensitive and important data. But which service should you choose?
by Lee Rickwood
goTenna Mesh works independently, and you do not need the usual wireless network services. It generates its own independent long-range radio waves, and that means users have a private and a secure way to communicate.
by Lee Rickwood
The processing power of the cloud allows for predictive prevention, in which collected data and powerful algorithms are combined to the predict places and times where crimes are most likely to occur.
by Lee Rickwood
As powerful and capable as customized mobile safety apps can be, it is surely a matter of culture and attitude as much as infrastructure and technology that must be changed if there’s any hope of reducing and eliminating sexual assault and violence on campus.
By Ted Kritsonis
The “lifelogger” category has never truly gotten off the ground, and part of it can probably be attributed to the inherent invasion of privacy others might feel. Narrative, makers of the Clip, has voluntarily shut down, while Snapchat’s new Spectacles glasses aim to live stream everything the wearer sees.
by Lee Rickwood
Big data breaches are not just about big companies: small- and medium-sized businesses (SMBs) are clearly vulnerable, and the confidentiality, accuracy and availability of their data assets always at risk.