Today’s next-generation manufacturing is marked by speed and technology. However, technology can be a double-edged sword. On one hand, technological innovations and advancements have resulted in a manufacturing resurgence in the United States. On... Read More
By Peter S. Vogel | A bad cloud contract can devastate any business, and a recent article “ 8 sure-fire ways to screw up a cloud contrac t” should be a wake-up call, but unfortunately many businesses learn the hard way. By way of example... Read More
By Shabbi S. Khan Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the year 2015... Read More
By Peter S. Vogel The NY Times reported that “regulators are looking at whether Google unfairly uses the software to promote its other dominant services.” The report entitled “ F.T.C. Is Said to Investigate Claims That Google Used... Read More
By Peter S. Vogel The volume of Ransomware is increasing dramatically after malware is downloaded by unsuspecting employees “encrypts a user or company’s files and forces them to pay a fee to the hacker in order to regain access to... Read More
By Stephen B. Mathus The NNI has just released its 2014 draft Strategic Plan for public comment. Aside from the opportunity to submit comments, becoming familiar with the plan offers a number of benefits to nanotech ventures. One is that it provides... Read More
900 MHz Reallocation | Almost a dozen parties filed comments last week in response to the FCC’s Public Notice seeking input on a supplement to the Petition for Rulemaking filed jointly by Pacific DataVision, Inc. (PDV) and the Enterprise Wireless... Read More
WASHINGTON, D.C. — (Mealey’s) The police generally may not, without a warrant, search digital information on a cell phone seized from a person who has been arrested, the U.S. Supreme Court found today, ruling on two cases consolidated on appeal... Read More
The Federal Financial Institutions Examination Council (FFIEC) has released its long-awaited Cybersecurity Assessment Tool (Assessment) to help financial institutions identify the inherent risks faced by a company and determine the level of maturity of... Read More
By Peter S. Vogel The Mimecast Incident Report stated that the US Data Centers and disruption of millions of emails were caused by a DDoS (Distributed Denial of Service) attack on September 21 from “10:46 am EST – 5:32pm EST.” The... Read More
Brad Gow says the decade-old business of providing coverage for computer networks has changed dramatically in a short time. As senior vice president at Zurich North America focusing on professional liability, Gow says a business that used to be about... Read More
It's a bit odd to think that about whether you have a privacy right in what you look like. But as companies continue to gather enormous amounts of all kinds of data - including faces - and wrestle with whether they can monetize that data, the fear... Read More
By Peter S. Vogel According to the Washington Post United Airlines “had rewarded two people with 1 million free miles of air travel each for discovering and disclosing software defects through the airlines “bug bounty” program…... Read More
By Peter S. Vogel With the help of the financial services industry “the legal sector has launched its own cyber-threat intelligence-sharing mechanism” known as the Legal Services Information Sharing and Analysis Organization (LS-ISAO) Services... Read More