With a proliferation of laptops, smartphones, tablets and smart TVs, the need for a strong and fast connection is bigger than ever. While a single router may not be able to cover the entire office space, range extenders or access points which complement the network may come in handy. But having
As more and more data and applications are moving to the cloud, organizations now face a host of new security threats and challenges. Today, cloud infrastructures appear to be the growing target among threat actors. In the last six months, cryptomining attacks have become the leading attack vector
Strong encryption of communications and data, which can both deliver security and privacy for individuals, has been in recent years a subject of public debate. Large-scale adoption of the technology made it difficult for the intelligence and law enforcement communities to perform their surveillance
Net neutrality has officially been repealed and internet service providers (ISPs) now have greater powers. Officials voice their concern as the new rules may lead to the creation of a two-speed Internet and special treatment for a certain type of content. The Federal Communications Commission (FCC)
Chinese telecommunications company Huawei wants to improve interactions between people and their artificial intelligence (AI) voice assistants. Huawei is currently working on providing emotional interactions according to Felix Zhang, vice president of software engineering at Huawei’s consumer b
After the FCC’s debatable decision in December that effectively eliminated Obama Administration directives aimed at protecting Internet neutrality, a series of legislative and political actions at the state and federal level took place. In March, Washington became the first state to pass a law of i