Archive

Search Blog

photo

Security of IoT: Issues and Solutions

Posted on May 24, 2016 0 comments
Category: Internet of Things

Any ISV considering IoT solutions or an enterprise wanting to take advantage of IoT solutions must be acutely aware that security is a fundamental piece of the solution. Not only could a potential exploit hurt product functionality and damage brand reputation, but it could also introduce network vulnerabilities to other connected server systems.  Read More

photo

Intel’s “Tick-Tock” Model Changes as Node Cycles Stretch

Posted on April 29, 2016 0 comments

In what many saw as the inevitable, Intel announced changes to their formalized 12-month tick-tock cycle a few weeks ago. Intel has simply decided optimizing the current architecture with new features is a more judicious use of time than trying to overcome the financial and physical barriers of shrinking the manufacturing process further.  Read More

photo

How Your Business Can Take Advantage of the Internet of Things

Posted on April 22, 2016 0 comments

Over the past few years, adoption of sensor networking technology — known colloquially as “the Internet of Things” or IoT — has grown tremendously. According to Gartner research, 29-percent of major organizations are currently using IoT technology. An additional 35-percent plan to implement it within the next 12 months, or soon after.  Read More

photo

Lifecycle Management Expertise to Reduce Risks and Hit Cost and Revenue Goals

Posted on March 11, 2016 0 comments

Partnering with an established value-added system integrator and deployment solutions provider can allow ISVs to avoid risks associated with their product’s lifecycle management. By anticipating problems during the design phase and providing long-term support once the product has shipped, overall costs are reduced, revenue pricing models are more reflective of lifecycle costs and customers become more satisfied overall. Even when the product nears the end of its useful lifespan, intelligent lifecycle management can mean timely replacement of obsolete systems with minimal downtimes.  Read More

photo

Here’s What We Learned at RSA 2016

Posted on March 10, 2016 0 comments

We just came back from an exhilarating five days at the RSA 2016 Conference in sunny, beautiful San Francisco, California. While there, we heard some of the most recent news in the information security industry. We also heard from thought leaders on such diverse subjects as the right to encryption, the relationship between privacy and government, and the possible evolution of software defined security practices.  Read More

photo

Intel's Transparent Supply Chain

Posted on March 02, 2016 0 comments

Media coverage of cyber attacks in recent years have turned the public’s attention towards enhancing network security. While most of these high-profile intrusions were the result of software-based attacks, a more concerning threat lurks behind the scenes: hardware compromises. Research data shows that around 16 percent of companies purchased counterfeit hardware equipment from 2006 to 2008.  Read More

photo

Why Should You Build on Dell with UNICOM Engineering?

Posted on March 01, 2016 0 comments

UNICOM Engineering and Dell are better together. Maintaining a strong relationship with Dell for over a decade ensures that we understand their technology platforms backwards and forwards. As a trusted partner we believe in joint problem solving, listening to your needs and designing solutions that optimize performance while controlling costs. Above all else, we intend to deliver on our promises while becoming an integral part of your team and protecting your brand.  Read More

photo

Global Expansion Partner: Eliminating Risks and Harnessing Revenue

Posted on February 24, 2016 0 comments
Category: Global Logistics

No matter how successful your solution is on your home shores, expanding overseas can mean navigating treacherous waters. Many successful Independent Software Vendors (ISVs) have had their lucrative operations scuttled when they try to scale internationally. Without the knowledge or resources to handle unfamiliar regulatory and certification requirements, manage support abroad or even to navigate challenging customs and export rules; ISVs jeopardize important opportunities.  Read More

photo

Application Deployment with Intel’s Next-Gen Haswell Microarchitecture — Part 3: Next Steps for Transitioning to Haswell

Posted on February 23, 2016 0 comments

Now that the Intel’s new Haswell and Broadwell versions of their Xeon processors families are available, Independent Software Vendors (ISVs) will consider transitioning solutions to this new architecture. Doing so early takes the best advantage of new capabilities while simultaneously meeting the demands and expectations of customers.  Read More