What makes an education technology tool truly innovative?
At DSN Group, Inc., we are excited about technology that makes use of existing tools in new ways to solve a problem no one has before. Innovations like Learning Tools for OneNote combine with existing tools, such as Bing’s speech recognition and natural language processing, to make the perfect reading assistant built for dyslexic learners but extremely useful for all budding readers.
Those are the types of innovations we want to help you implement in the classroom. Contact us to learn more.Read More
I recently saw an article that said – “Want to enhance your cyber security and privacy? …here are more than 50 free tools to help you.” I love the idea of having some open-source or free tools…but what concerns me is having a need for so many tools. AV and Endpoint security SIEM Security Information…Read More
We authored a blog on Win7 back in 2016…it was on end of sale of the popular OS. Arguably, one of the most popular operating systems of all time, certainly Microsoft’s most popular…or was. One that has lasted even longer than Microsoft expected…GA – generally available in October 2009, Microsoft has announced the end of…Read More
The IT landscape always seems to be changing and advancing. It has gone from centralized to distributed and back several times. And again, seems to be transitioning from centralized environments and moving to distributed – a lot to the edge. We are moving toward a more edge-centric/focused technology environment. With IoT, Wi Fi, 5G, more…Read More
Why is it important? What are the risks? How do we build that culture? The reason that IT security is important is twofold. First of all, more data is being kept electronically/digitally vs. keeping hard copies. As a result, more information is being kept in this format because it is easy. Plus, the second reason…Read More
Security is one of the key areas that companies are looking to improve. Ask any senior IT manager and it ranks as one of the top initiatives. Ask almost any business executive and it is also a high ranking topic. I have been on several calls with our resident security analyst and he almost always…Read More
If you’ve bought a new car recently, you likely did not consider the total cost of ownership as part of your selection process. You probably did not ask the dealer about the total cost of oil changes, new tires and wiper blade replacements for the next five years. If you liked the car, the price…Read More
Ransomware has been around for about a decade. But it still is a concern for many CIO’s, IT managers and business executives. Ransomware is a type of malicious code/software that threatens to either publish the victim’s data or withhold access to recovering files until a Ransom is paid. The actual malicious code/software is typically delivered…Read More
In a report published by the SANS Institute reviewing IT security spending trends (2018), they rank “spending effectiveness”. The effectiveness rank of the top 5 in a list of 21 is: Access & Authentication Endpoint Security Advanced Malware prevention Wireless Security Continuous monitoring The top 5 in dollars spent are: Access & Authentication Advanced Malware…Read More
DR planning can be a challenging task. It requires gathering and documenting information from multiple sources. But it is important and equally important to keep updated. Here are some reasons to update/create a DR Plan. Hardware and systems fail Humans make mistakes User expectations — everything works all the time The cost of downtime to…Read More