By Karen Mitchell Just Add Power explains its partnership with Audinate’s Dante, and why you will be seeing more uses for the audio networking technology in the near future.
Researchers are monitoring hacking group Chimera, which has been targeting Google and Microsoft cloud services without being detected for years, in at least one case. The group employs a series of tactics to perform password-spraying attacks and compromise admin accounts.
IBM is looking to bolster its cloud migration and transformation services with the purchase of Taos, a cloud-focused managed services provider. IBM's John Granger says Taos will add "the deep expertise, public cloud partnerships and innovative solutions needed to drive growth and adoption of IBM's hybrid cloud platform throughout the Americas."
By Jim Beaugez. A smooth-sounding signal chain is crucial for a podcast that puts you to sleep (on purpose). Podcaster Christopher Fitton shares how he learned the audio ropes while racking up 2 million listeners every month with his hypnotherapy show, Sleep Cove.
By Clive Young. Nashville pop singer/songwriter Meghan Trainor ("All About That Bass") put down $6.6 million in late 2020 for an LA mansion; let's take a look at the home studio that came with it and do some gear trainspotting.
The Tula Microphone is a portable recorder/USB-C mic with an embedded version of Swedish music software company Klevgrand's noise reduction algorithm, Brusfri.
The brand that cybercriminals pretend to represent most often in phishing attacks is Microsoft, finds an analysis by Check Point, which noted the wide acceptance of Office 365 software. Other brands commonly impersonated include Amazon, Google, LinkedIn, PayPal and Yahoo.
Adapting to new work-from-home realities means starting with multifactor authentication protocols, writes Martin Kuppinger of consulting firm KuppingerCole. Fortunately, Kuppinger points out, remote work dovetails nicely with other trends in IT—shifting to the cloud and implementing zero-trust security protocols.
Data privacy created by third-party applications is a danger to school districts, writes Katie Fritchen, who offers six best practices for administrators. Fritchen's final suggestion: Use automated tools to govern apps and avoid violations of the Family Educational Rights and Privacy Act.
- Page 1
- ››