Microsoft Teams is often used for team meetings by home office users and in companies with distributed locations. Since sensitive data is also used here, security and data protection should be adapted and checked. Security and data protection when using Microsoft Teams in companies can be checked and defined at […]
Monthly Archives: February 2025
NaaS is the next logical step in network technologies for manufacturers and companies – a network as a rented service. If a company buys new hardware, e.g. a switch , it no longer buys the device plus a support contract. Instead, it subscribes to a service, including hardware and some […]
Microsoft has released a demo of a Raspberry Pi simulator for its cloud platform Azure IoT. Users can use it to test JavaScript code to control simulated add-ons such as an LED or sensors via the single board computer.> The idea behind the online Raspberry Pi SimulatorAccording to Microsoft. This […]
To prevent home offices from becoming a gateway for cyber criminals. Companies must be able to manage, update and protect remote devices just like in the office. If they succeed in doing this. They have already created the basis for location-independent working.> It has now been more than a year […]
Token Bus is a networking technology that uses the token method to control access to the medium and avoid collisions. The logical ring required for this is mapp onto a physical bus structure. The method is very suitable for network applications that require deterministic transmission behavior. The most important IT […]
6 Steps Against Blind In the context of digitalization in particular, there has been a constant stream of new hype for some time, to put it bluntly. But not every technology that is heralded as the Holy Grail and not every must-have tool actually lives up to the initial euphoria. […]