Archive

Search Blog

Archive: May 2016
photo

Increasingly, enterprises are demanding hardware sourcing authentication as a way to prevent counterfeit components from creating vulnerabilities within networks or systems. Incidents like the recent revelation that Apple may have purchased compromised motherboards are the reason that sourcing information and verification of supply chain integrity are becoming mandatory for certain contracts.  Read More

photo

Security of IoT: Issues and Solutions

Posted on May 24, 2016
Category: Internet of Things

Any ISV considering IoT solutions or an enterprise wanting to take advantage of IoT solutions must be acutely aware that security is a fundamental piece of the solution. Not only could a potential exploit hurt product functionality and damage brand reputation, but it could also introduce network vulnerabilities to other connected server systems.  Read More

photo

Into the Deep Technology

Posted on October 18, 2018 0 comments
Category: Technology

Deep technology extends far beyond the standard innovation of today’s technology and stretches into the world of future tech, where robotics, artificial intelligence (AI), and humans interact on a new level.  Read More

photo

UNICOM Engineering Launches Appliances Featuring Low-Power Intel Atom® C3000 SoC to Fill Market Gap

Posted on July 23, 2018 0 comments
Category: News

UNICOM Engineering introduced a portfolio of platforms optimized for the growing Embedded Appliance and Network Edge markets. The latest products feature high density, low-power server solutions, which provide new options for value-segment buyers who want advanced performance.  Read More

photo

Harnessing the Potential of Artificial Intelligence

Posted on July 16, 2018 0 comments
Category: Dell EMC OEM

AI holds the power to help businesses make faster and better decisions, to create better products, to deliver outstanding services and to achieve competitive advantage. UNICOM Engineering eases the burdens of deployment so that you can focus on delivering innovative AI applications that solve real world problems.  Read More

photo

Are You Ready to Move to the Edge?

Posted on June 06, 2018 0 comments
Category: Edge Computing

Edge computing is a solution to the data load challenges brought about by the rapid increase of IoT devices. In the context of IoT, “Edge computing” refers to the computing that takes place close to the sources of data.  Read More

photo

A Busy Season of Engagement – NAB, ISC West, RSA, and Dell Technologies World

Posted on May 02, 2018 0 comments
Category: Events

Each spring the major technology companies each have major events, unveiling the upcoming years' new product releases and to discuss where they are planning to expand their growth in the market. Events we attended thus far have included the DellTechWorld, RSA 2018, ISC West, and NAB.  Read More

« Previous1234567...22Next »