Most smart city workshops led by big consultancies move right into discussions about electric and autonomous vehicles, mass transit mobility, IoT, 5G, data, renewable energy and distributed grid, ...
I was first introduced to the limitations of ‘end user’ thinking a decade ago when I managed the rollout of an oil & gas exploration toolset. I expected clear processes and defined user roles. Instead ...
In an increasingly connected world, the demand to access our devices and applications is 24/7. Immersive, real-time experiences like virtual workstations, AR/VR, smart cities, smart manufacturing, ...
Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
From an end user computing perspective, 2024 is the year tech executives tried to convince the world that artificial intelligence (AI) can help employees to work more efficiently. This has resulted in ...
The shift to a more distributed work environment and an increase in digital transformation initiatives have motivated organizations to bolster their endpoint security defenses. However, end users ...
Doug Bonderud is an award-winning writer capable of bridging the gap between complex and conversational across technology, innovation and the human condition. Virtual private networks play a critical ...
For over a year, employees have grown used to presenting and collaborating directly from their devices. Videoconferencing when all employees are remote allows for quick and easy sharing of content and ...
It always takes two for a phishing attack to work – an attacker to send the bait and an insider to take it. Almost every organization carries out some form of security and awareness training (SAT) to ...
Artificial intelligence, large industrial energy intensive users, and electrification are driving a new market dynamic for more power - and it must also be clean, dependable and affordable. Panellists ...
The sheer volume of data breaches and cyberattacks means these incidents are now more visible than ever. Long gone are the days when affected organizations would wait until late Friday afternoon to ...