Cyber attacks have increased in frequency as more and more organizations adopt the Internet of Things (IoT). Risks still exist despite the rise in cyber security, which is meant to […]

Cyber attacks have increased in frequency as more and more organizations adopt the Internet of Things (IoT). Risks still exist despite the rise in cyber security, which is meant to […]
The growth of electric vehicles and the smart grid has led to the creation of vehicle-to-grid (V2G) technology. Imagine using your electric vehicle to power your home during a storm-induced […]
Is artificial intelligence (AI) capable of flexible learning? Humans have the ability to learn from their situations and environments. In order for AI to do the same, it must first […]
This is a sponsored post from Digi-Key. Written by Nancy Ordman. What technical skills do you need for 2020? How different is the 2020 list from previous years? Skills that […]
A future with widespread autonomous vehicle (AV) technology could include less traffic, safer roads, and interconnected vehicles that allow drivers to sit back and enjoy the ride. Expected to reach […]
Three important qualities of blockchain—decentralization, immutability, and security—could have many interesting use cases in the healthcare industry. One area that could greatly benefit from blockchain technology is telemedicine, the relatively […]
While it may be too early to know exactly how 5G will benefit edge computing, the technology will have some sort of impact on consumers and businesses. The growth of […]
With the booming Internet of Things (IoT) device market, many people expect to be connected at all times. While it is unrealistic to be online 24/7 with no drops in […]
Even in 2019, women are still underrepresented in the fields of science, technology, engineering, and math (STEM). Statistics from the National Girls Collaborative Project show that although half of the […]
Cloud security threats come in many different forms including data breaches, hijacked accounts, data loss, denial of service, and system vulnerabilities. As organizations and individuals continue to adopt the cloud, […]