SaaS, PaaS, IaaS.
Cloud computing is a term thrown around a lot these days, but what is it and how can businesses benefit?
The cloud is a distributed network of data centers and IT resources that are accessible on-demand over the Internet on a pay-as-you-go basis. While the concept of “the cloud” is abstract, ultimately it is made up of actual physical infrastructure. Like public …Read Full Article
Communities upgrading their fiber optic connections and communicationtechnologies to aid in economic development.
by Laurie Wink
In today’s world of high-speed communications, a fiber optic infrastructure is an essential tool for economic development in communities throughout our region. Cities that already have fiber optic systems, such as South Bend, are expanding their networks. Others, including Michigan City and Valparaiso, are earlier in the process.…Read Full Article
Address cardiovascular disease with both new technology and well-known advice.
by Cassie Richardson
Imagine if preventing a heart attack was as easy as swallowing a pill.
The idea may sound like an imaginary convenience taken straight from the Space Age world of cartoon character George Jetson. But at Google X, Google’s semi-secret research facility in Mountain View, Calif., scientists are working to bring this concept …Read Full Article
Indiana researchers are making progress on everything from tracking cancer to healing diabetic wounds.
by Laurie Wink
Innovative research at area universities is producing promising results for advancing health and medical care. Breakthroughs could lead to new ways of tracking cancer cells, treating colitis and healing diabetic wounds, to name a few possibilities. But the process of taking discoveries from bench to bedside requires years …Read Full Article
Threats are ever-increasing, and so are jobs for security specialists.
by Michael Tu
With the recent high-profile cyber incidents targeting Sony Pictures, Anthem, Home Depot and Target, cybersecurity has become a major concern for businesses and consumers, as well as our government’s national security agencies.
Today, businesses are facing formidable challenges to cybersecurity because of increased cyber and global connectivity and the widespread use of …Read Full Article
It has the power to move customers more than still images.
Last winter’s relentless cold, snow and ice made it hard to draw visitors to the Indiana Dunes.
Then we shot “the video.”
Using a camera-equipped remote control helicopter, we got dramatic aerial footage showing the beautiful, Arctic-like shelf ice along the Lake Michigan shore at Indiana Dunes State Park.
We donated the video to …Read Full Article
They happen everywhere. How can your company be safe?
Almost no industry seems to be free of data breaches. In retail, we’ve heard about Target and Neiman Marcus (and now Sears and other retailers are investigating whether they have been hacked). In education it’s Indiana University and University of Maryland, the most recent as of this writing. We’ve heard about Barclays Bank and the government …Read Full Article
If you don’t cater to the needs of mobile users, someone else will.
by Dillon Carter
Every business, organization, and even the lone, single freelancer or entrepreneur has an identity. A reputation is the feeling that people get when they think about a company, the way they perceive the company. And that can go well beyond what the company produces. It is why Coca-Cola is …Read Full Article
Be sure your technology is prepared to survive failure or disaster.
by Gregory P. Scasny
In the event of hardware failure, file loss, theft or even natural disaster, it’s imperative that your business is able to resume without delay, in order to sustain productivity, revenue, customer satisfaction and success. A Recovery Time Objective (RTO) plus business continuity and backup plans can make downtime a thing …Read Full Article
Small businesses are especially vulnerable to data theft.
by Rich Shields
In today’s society, it is imperative to stay up-to-date with all the latest technology changes and buzzwords, e.g., cloud, managed services, BYOD, bandwidth, security, etc. However, what can we do to ensure we are secure as businesses, consumers and individuals?
Phishing and online scams have been in existence for many years, and things are …Read Full Article