We have covered some of the ways that creative people have applied the technologies which have grown out of the early ventures in 3D printing in a number of articles over the past few years. The concept continues to grow as more and more ways are found to apply the concept using different types of mediums as well as different kinds of tools to create the printed items.Read More
Office Document Strategies Blog
Anyone watching the political situation in the US knows that cybercrime has become more than just an economic tool. The political use of cybercrime is potentially even more critical to the world than the economic impacts but understanding this should not have any of us forget how critical the dollar costs are.Read More
Until the development of 3D Printing when someone talked about printing we all understood it was a two dimensional output, black or coloured toner on a flat piece of paper.
With the development of 3D printing and its rapid advancement into using many different types of raw product for the printing of three dimensional objects the technology has been pretty revolutionary for all kinds of fields. One of these is the automobile field, especially for the production of one off parts.
In a recent video I saw produced in Jay Leno's garage a famous place to anyone who has an interest in automobiles he describes how they have used 3D printing to produce parts for cars at the extremes of his collection. In one case it is product for a 100 year old early generation electric car and in another parts for a special one off concept car that they created.
The Online Trust Alliance issued its tenth annual report on cyber incidents and breach readiness in late January 2018.
A key feature of the report is the amount of impact that ransom type attacks have had in 2017 both in direct malware and other elements like threatened denial of service events.
It summarizes that preparation and constant diligence are key in avoiding cyber threats.Read More
"Pretty much every PC, laptop, tablet, and smartphone is affected by the security flaw, regardless of which company made the device or what operating system it runs."Read More
All of the controversy around the issues of the Russian intervention in the US and other country's elections sometimes covers how important cyber security and the ability of IT networks to be secure is to everyday activity. If the general media was only focused on the political consequences of hacking of IT systems we would not hear about how some of the daily things we do are affected.
Some headlines which show Canada is not immune to the issues:
The costs associated with building systems, acquiring protection software and spending time to keep on top of current threats are all things which we as consumers end up paying for as they get incorporated into the costs of the goods and services which we use.
A recent CNN summary itemizes some of the biggest stories which have occurred including the 145 million accounts from the Equifax hack, the announcement the total of 3 billion Yahoo accounts were hacked in 2013 and closer to home the fact an Ancaster hacker connected to Russians has now pleaded guilty to hacking up to 500 million Yahoo accounts from 2014.
These kinds of events kind of make use glaze over as we figure there is nothing we can do to protect ourselves but we do know that Canadian organizations are forced to spend large amounts to attempt to build protections for us.
We end up having to deal with less convenient systems as things like double authentication security start being applied to our online accounts. Cumbersome conventions which force us to not be able to directly connect to some financial activity without using fairly difficult security procedures frustrate people and lead them to avoid using electronic systems.
Of course the convenience provided by electronic communications including credit and debit transactions hook most of us into continuing to stay connected and to hope that our information will be held secure by the organizations we buy from. Every effort which can be made to help secure online transactions (which include most cash register systems) will pay dividends in consumer confidence hopefully.
Looking ahead to 2018 we can only hope that cyber security will remain a high priority for the legitimate IT industry and that break throughs can occur which will frustrate those who seek to illegitimately use electronic data.
Photo credit: By ITSveronica (Own work) [CC BY-SA 4.0 (https://creativecommons.org/licenses/by-sa/4.0)], via Wikimedia Commons
Since its creation in 2009/10 bitcoin crypto currency has always had a kind of unreal story. The concept of a globally exchanged currency without a nation as a sponsor or guarantor which is traded by person to person or company to company transactions without a banking system regulator was unreal until it happened.Read More
Virtually every business today has some sort of need for connectivity for its computer and IT needs. Whether it is using cloud based applications to process data and transactions or using a cloud based data backup strategy the ability to get on line safely and quickly is almost a given.
Unfortunately not all locations are equal in providing competitive options for businesses to get this needed connectivity. The greater the need and the more intensive the connected traffic then the more the locational decision for a business can be impacted.
In a couple of articles over the past month ITbusiness.ca has shown how cities and their partners are starting to look at these issues. The focus of these articles are on Toronto and the announcement about the Google neighbourhood announced for the water front and also on a plan to rate buildings in Toronto on their connectivity capability as a means to build competitive advantage.Read More
Since it became the defacto norm for WIFI network security the WPA2 security setting has been the standard for almost every WIFI network setup.Read More
When first invented and popularized fax machines were seen as a wondrous invention. After all being able to send a piece of paper or even a whole document to someone in another office or even across the world over a phone line was pretty different than the norm at the time.Read More