
At ISM, the safety and security of our employees, customers and local communities is our utmost priority and our thoughts and prayers are with those impacted by the Coronavirus. As of today we have no employees or family infected with
Read More
At ISM, the safety and security of our employees, customers and local communities is our utmost priority and our thoughts and prayers are with those impacted by the Coronavirus. As of today we have no employees or family infected with
Read More
With the recent announcement of security vulnerabilities found on microprocessors IBM has released the following statement. They will be releasing patches but the best and most important security you can apply to your systems is a good firewall. Contact us
Read More
It’s better to avoid a security breach — than hunt for excuses afterwards. When network security is breached, many companies scrabble around for answers. Who’s to blame? What did they do? Will it happen again? But by then it’s often
Read More
With your users expecting full access to the enterprise network on their mobile devices, have you implemented a security plan? Nathan Wenzler has some great advice here, talk to one of our experts who can help you refine and implement
Read More
Good synopsis here http://patentlyo.com/patent/2015/02/devices-yoda-2015.html from Dennis Crouch on the You Own Devices Act which will empower you as the owner of your system to get value for the investment in the system software when you go to sell to us.
Read More
Big Data has been the buzz word in play for some time and IBM is hopping on this trend as shops try to get a handle on how to handle “Big Data” in their operation. IBM has announced their new
Read More
Interesting news here out of IBM. They have licensed a Chinese manufacturer to be able to make their own version of the forthcoming IBM Power8 Chip. Very interesting development for the market and it’ll be interesting to see how this
Read More
Not sure we are either, but Gartner has an interesting view that organizations can put the right practices in place today to build a data center to meet business needs indefinitely. Some food for thought here from Gartner: With the
Read More
Gothenburg, Sweden – October 1, 2013: According to a new research report from the analyst firm Berg Insight, the global number of mobile network connections used for wireless machine-to-machine (M2M) communication will increase by 22 percent in 2013 to reach
Read More