For more than a decade, the face of wireless has been IEEE 802.11 WLANs, your typical Wi-Fi networks prevalent in every home and business. In 2020 and beyond, the line…
As we all come to terms with quarantine and shelter-in-place orders being extended for longer than most prepared for (both emotionally and in terms of our stash of snacks), and…
Everyone on the internet should follow good data security and privacy practices. And when I say everyone, I mean everyone. IT pros aren’t the only people who need to protect…
Esports is soaring in popularity in K–12 schools and in higher education as student gamers find a competitive and team-based outlet for their video gaming habits—playing not in isolation but…
The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on the edge gets information…
In government, mobile devices are both embraced and resisted. The mobility and ease of use afforded by smartphones and tablets helps boost worker productivity even as they open doors for…
As we roll into the next decade and IoT becomes commonplace in most organizations, requirements for connectivity will change. Over the last decade of Wi-Fi, we’ve seen a push for…
OK, folks. Let’s be real for a moment and acknowledge that everybody, every professional, and definitely every vendor out there is tossing out the phrase “IoT” like flyers on the…
Have you ever had a colleague who waited year after year for a promotion that never came? Or worse, have you BEEN that person? You’re not alone. Many IT professionals…
Careful monitoring and attention to endpoints are just two elements of a strong cybersecurity strategy for K-12 districts. Cybersecurity must be a top priority for K-12 schools. Schools need to…