Walmart got hacked by a security expert at a recent conference. The story was both funny and instructive, but it wasn’t funny for the Walmart employee duped into giving up all sorts of information the security expert could use to gain access to Walmart systems. (The security
Read more →Designing buildings. Estimating costs. Tracking time. Managing projects. Billing for time and materials. Reporting RFls. These, along with dozens of other types of paperwork, have long been crucial in the businesses of architecture, engineering and construction (AEC). That all this work once ran on paper alone seems
Read more →Not so long ago, law firms dictated what types of smartphones — typically BlackBerrys — their staff could use for work. This has been giving way to the bring-your-own-device (BYOD) trend, which may spell the end of the BlackBerry’s near-hegemony in the workplace. Some people attribute BYOD
Read more →Almost two months ago, I reviewed technology new to me that blew me away in less than half an hour. But (and maybe this is just my nature), I have a minor gripe or two. I tried to tweet this particular gripe (and a recommended solution) to
Read more →Buildings are single systems made up of well-integrated components. Yet buildings get designed using multiple systems that don’t always integrate well, a situation that keeps design and building processes prone to inefficiency and error.
Read more →Law offices have long used sophisticated computer systems. Today, those systems don’t need to reside in the firm’s offices. Using cloud computing, also known as software as a service (SaaS), firms can use robust systems located off the premises. But attorneys aren’t rushing to replace premise-based systems
Read more →On a network diagram, icons for things like phones, computers, servers and other devices often connect using straight lines. But when those devices leave the office, they connect back via a nebulous connection: a cloud. The cloud illustrates paths from devices to information that can vary depending
Read more →Lots of people refuse to connect to the Internet using open wireless networks like those you find at coffee shops. Why? Their information travels unencrypted over those networks, making it possible for people nearby with the technical tools and know-how to read what they send. But today,
Read more →