How to decide between on-premise, cloud hybrid or multi-cloud

With so many options for data storage and hosted or on-premises solutions, how does a business choose the right one? Deciding how and whether to use cloud computing isn’t a simple flip of a coin. It’s made all the more complicated by an overwhelming number of vendors and products. After years of deploying each method – on premise, cloud, hybrid or multi-cloud – and then evaluating which worked and which didn’t, experts have deciphered what situations tip the scale toward one approach or another.  While the context is data storage, this analysis applies to most enterprise IT scenarios.

Continue reading

Will the cloud save big data?

Employees up and down the value chain are eager to dive into big data, hunting for golden nuggets of intelligence to help them make smarter decisions, grow customer relationships and improve business efficiency. To do this, they’ve been faced with a dizzying array of technologies – from open source projects to commercial software products – as they try to wrestle big data to the ground.

Continue reading

Our 9-1-1 system is vulnerable to attack

A telephony denial of service (TDoS) attack is a specific type of DDoS attack that originates from or is directed towards a telephone system with the intent of bringing down the targeted system. These attacks commonly focus on commercial businesses and may often include ransomware requests. In reality, these attacks can affect anyone, including our nation’s 911 infrastructure, because even it is not isolated from or immune from these types of attacks. And based on its mission, in many ways, it is more fragile.

Continue reading

10 Great Tech Gifts for the New Grad

Whether they’re just finishing high school and gearing up for college, or wrapping up a long sought-after Ph.D, the students in your life deserve some celebrating. And while cold, hard cash is often the graduation gift of choice, if you want to be certain your present isn’t blown in a post-finals bender, you’re advised to give something that requires wrapping paper. These 10 tech-centric presents are great for students past, present, and future, not only because they keep them connected, concentrating, and curious, but because they’re fun, too.

Continue reading

Comtel Communications & Simplicity VoIP Ranked 31st in Richmond for Charitable Donations

In their annual list of top charitable businesses in Richmond, Richmond Biz Sense ranked Comtel Communications & Simplicity 31st out of the top 50 companies listed. With donations to The Richmond Ballet, Make-A-Wish, Steward School, Montessori School, Bandit’s Animal Rescue and many others, Comtel & Simplicity have demonstrated their commitment to being good stewards of their community. These two partner businesses are continuing their efforts through a 2017 campaign called “Gifts of 25”, in celebration of their 25 years in business. Each month, a charity selected by an employee is given a gift in keeping either with the number “25” or related to technology. FeedMore received 2500 meals, B.A.R.K of Ashland received 25 bags of dog food, and Make-A-Wish received a video conference phone. If you’d like to see the entire list of businesses on the Richmond Biz Sense list, click here. To […]

Continue reading

Listen up Twitter! Mastadon’s sudden popularity is your wake-up call

There’s a hot new social network these days and it’s called Mastodon. Well, it’s not that new — it’s been around since September 2016 — but it’s gained tens of thousands of users in the last few days. The reason for the growth? According to its founder, Eugen Rochko, it has a lot to do with people getting increasingly fed up with Twitter, especially the recent decision to nix @usernames from Replies. Mastodon — named after an American heavy metal band — is mopping up users seeking an alternative. Sure, Mastodon is still small and relatively unheard of, but the very fact that it spurred this much interest is a sign that the established social networks like Twitter are fundamentally failing at one thing: keeping users happy.

Continue reading

Shock absorber, flotation patented for iPhone

Apple has patented bumpers that pop out to cushion the impact when an iPhone is dropped. These shock absorbers will also allow the device to float. The newly-patented technology uses sensor that can detect when the device falls, calculating the height and velocity of movement to determine whether it has been dropped or just set down. If it decides the phone has been dropped, corner bumpers will spring out. By cushioning a fall, and allowing the phone to float if dropped in the pool, bath, sink or toilet, the risk of irreparable damage is minimized. Once the phone has been retrieved, the corner bumpers ca be retracted. In the meantime, you can always get the Mota Bumper case for your phone. The bumpers don’t retract, but the risk of damage is still minimized from a drop (not a flotation device). From it-online.co.za | […]

Continue reading

Faster cellular signals slow down Wi-Fi

You may soon see faster connections on your cellular service. But your Wi-Fi connection may pay the price. Thanks to a recent regulatory decision, wireless companies like Verizon and T-Mobile will soon be transmitting data in the same part of the public airwaves that’s used by Wi-Fi. The move will give the carriers more spectrum to play with, which should lead to faster speeds for their customers. But those cellphone signals may interfere with Wi-Fi transmissions.

Continue reading

What Is a “Fileless” or Non-Malware Attack?

Every year seems to be “the year of” something in cybersecurity. In 2013, it was “the year of the financial breach.” In 2014, the “year of the retail hack.” In 2015, we saw at shift to healthcare and, in 2016, ransomware reigned. 2017 is already shaping its own theme. Research from prominent third parties, as well Carbon Black’s own research, indicates that 2017 may become “the year of non-malware attacks.” Non-malware attacks have been in the news a lot recently. Let’s take a step back and understand what we’re up against and what can be done. Defining “Non-Malware” Attacks

Continue reading