Technology is undoubtedly an integral part of most industries today. In order to adequately prepare students for a future that is sure to incorporate a mixed environment of human and artificial intelligence (AI) technology, schools must begin to mirror the same environment one can expect once out in the workforce.
Remote education systems, in addition to an increase in the demand for cloud technologies, is changing the way educational curriculum is delivered. A variety of technology platforms and microservices are rapidly evolving as key business models in the educational sector. Read more +
While artificial intelligence or “smart” technology will soon be prevalent in a variety of industries, it is sure to revolutionize the healthcare industry in particular; an industry that will impact us all in one way or another. Whether as providers or patients we are sure to see transformation of the design and insight into treatment plans, management of medications, as well as improving efficiencies and assisting in repetitive work duties. Read more +
Building your business website or embarking on a web redesign project includes several moving parts including scope definition, sitemap and wire-frame creation, content creation, user interface (UI) design among several other elements. Choosing the right web platform to build your website upon should balance the requirements of functionality, ease of use, price, customization needs and technical features. Quite commonly embarking on a web design project will lead most small businesses to choose from two popular web services: Squarespace or WordPress. Read more +
When faced with the numerous hardware and software options available on the market today, understanding differences in warranty claims becomes an important part of decision making process. The procurement management process is without a doubt, a critical component to business success. When introducing hardware and software in the workplace, management of the procurement life-cycle will surely have effects on the office efficiency and security. It is essential to implement the right technology to see a real benefit, increase the productivity of your staff and ultimately see an increase in profitability. Read more +
A “golden key” or a universal back door method, allows the bypassing of normal authentication in a product, computer system or algorithm. If used ethically it can be used for securing remote access to a computer system or for debugging purposes. The controversy surrounding golden key methodology stems from the fact that in the wrong hands, it can also open up physical access to those with malicious intent.
Major hardware manufacturers like Apple, Microsoft and Blackberry have taken publicly dissimilar positions on releasing universal back doors to their devices. As the world increasingly depends on devices supplied by these few suppliers, it is important to know where they stand, so you have an idea where your sensitive personal data is likely to end up. Read more +
As law firms strive to become more efficient and move towards the much sought after “paperless” office environment, cyber security must remain at the forefront of any technology initiative. But how can law firms be expected to manage and protect their network infrastructure in addition to managing client matters and cases? While technology can certainly help manage the workload, it shouldn’t have to be a part of your firm’s core competencies. Read more +
Botnets are robot networks made up of computers, or any device with network connectivity (computers, security cameras, smart TV’s, smart thermostats, etc.). Botnets have a long history in technology, as they have been around since the early days of the internet. While commonly perceived to be malicious in intent (and rightfully so), botnets do not exclusively perform destructive commands. Read more +
Ottawa wins top rankings, in a game no one wants to be playing.
It is the malware infections (including phishing and ransomware) rate that Ottawa ranks highest in, even when compared to a city like Toronto where the population is significantly higher. Our city has taken notice, as Ottawa Hospital, Carleton University and several non-profit charities have fallen victim. In an effort to combat the attacks, Prime Minister Justin Trudeau announced last summer the public consultation on cyber security strategy, while the IT industry as a whole strives to share threat information about emerging threat vectors. Read more +
The Digital Privacy act, originally passed in 2015, has updated elements of its legislation that will require Canadian businesses to adhere to strict guidelines and policies in order to protect confidential information and disclose security breaches. While each organization will have to prioritize its defenses, there will be certain criteria every one will have to follow. While official standards will be released later this year, there are steps you can and should implement immediately to improve you company’s security posture. Read more +
As a response to the ever-evolving cyber-security threats Canadian businesses face in daily internet interactions, the federal government has responded. Later this year, newly drafted hacking disclosure legislation will require all businesses in Canada to report any cyber security breach as soon as they become aware of it. Read more +