Posts in Technology

2019 Low Voltage Wiring Guide-New Construction

April 22nd, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “2019 Low Voltage Wiring Guide-New Construction”

“Very valuable piece on low voltage wiring in new construction scenarios. If you are not comfortable doing it on your own, give us, a call, and we can do it for you!”

– Todd Hepler, Chicago Voice & Data


It’s the age of wireless devices, yet it is still essential to understand what low voltage wires you or your home builder/installer should be running when building a new home.

This article from Smarthomemastery.com will provide you with an excellent introduction into the world of low voltage wiring for new construction. Also, Tim (the author), provides an informative guide to each type of low voltage application and what you (or your installer) should be using respectively. As a bonus, Tim also sprinkles in some excellent tips for you do-it-yourselfers.

Learn More about Chicago Voice & Data.

What You Need to Know About Counterfeit Cable and Connectors

April 17th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “What You Need to Know About Counterfeit Cable and Connectors”

“Using counterfeit cable or wiring can be disastrous to your business or your home. With all things connected today, cutting corners upfront can lead to disaster in the end.”

– Todd Hepler, Chicago Voice & Data


Look around your office, there are not many products not connected to something via a wire or cable. That being said, counterfeit cable and wiring is a hot topic that you should be aware of to keep your business (or home) safe. The issues are many if you or your installer uses counterfeit cabling or wire and you should be aware of the potential long-term cost of doing so. Look at this short read by Stu Tisdale for ADI Global to find out the potential hazards of using counterfeit cable and wiring and protect yourself before things get hot.

Learn More about Chicago Voice & Data.

Almost Half Of SMBs Would Be Shut Down Permanently By A Major Data Breach

March 21st, 2019 Posted by Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Almost Half Of SMBs Would Be Shut Down Permanently By A Major Data Breach”

“A major data breach has just become a larger concern for many SMB’s than an office fire, flood or physical break-in, according to this recent AppRiver survey.”

– Glenn Baruck, eDot


If you own a small or mid-sized business, these recent survey results should grab your attention! According to the recent AppRiver survey of 1,059 cybersecurity decision makers at SMBs with fewer than 250 employees, forty-eight percent of SMBs say a significant data breach would likely shut their business down permanently. That is a sobering thought for sure and in some sectors, the number was even higher. Check out this concise summary by Jeff Goldman for Small Business Computing.com if you want to learn more.

Read more

Learn more about eDot.

What Is A Managed Firewall and Do You Need One?

March 20th, 2019 Posted by Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “What Is A Managed Firewall and Do You Need One?”

“Do you need a firewall? The short answer is yes. Do you need a skilled partner to manage your firewall to maximize its effectiveness? That is the bigger question that needs to be addressed.”

– Glenn Baruck, eDot


Two of the most common questions we receive as an MSSP (managed security service provider) are in the headline. This brief article by Security Analyst Todd Hovorka will introduce you to the definition of a Managed Firewall, help you understand its nuances and determine whether this type of service is right for your company. Many companies have an internal IT person that can purchase and even implement the initial set-up of a firewall. What happens after that is as critical as having one in the first place and requires constant vigilance.

Read more

Learn more about eDot.

3 Cybersecurity Threats Businesses Should Look Out for in 2019

February 27th, 2019 Posted by Technology 0 thoughts on “3 Cybersecurity Threats Businesses Should Look Out for in 2019”

“Technology changes quickly and cybersecurity threats advance even faster. Check out three of the evolving cybersecurity threats you should be on top of in 2019.”

– Glenn Baruck, eDot


According to technology experts, the fastest changes taking place in technology are cybersecurity threats. The cyber underworld is evolving and consolidating, according to the McAfee Labs 2019 Threats Predictions Report. “We have witnessed greater collaboration among cybercriminals exploiting the underground market, which has allowed them to develop efficiencies in their products. Cybercriminals have been partnering in this way for years; in 2019, this market economy will only expand. The game of cat and mouse the security industry plays with ransomware developers will escalate, and the industry will need to respond more quickly and effectively than ever before,” writes Raj Samani, chief scientist and McAfee fellow for advanced threat research, in an introduction accompanying the report.

What does 2019 have in store when it comes to cyberthreats? In this article by Juliet Van Wagenen for BizTech, you can learn about three security concerns/threats that all businesses should be paying attention to right now.

Read more

Learn more about eDot.

The ‘World’s Most Beautiful Data Center’ Is A Supercomputer Housed In A Church

February 12th, 2019 Posted by Security & Surveillance, Technology 0 thoughts on “The ‘World’s Most Beautiful Data Center’ Is A Supercomputer Housed In A Church”

“Divine knowledge? Possibly, but divine computing power that is for sure! If you love computers and architecture, you have to check this out.”

– Todd Hepler, Chicago Voice & Data


There’s a lot of high-powered computing going on these days, but we are willing to wager none is at a higher power than the number crunching taking place at Torre Girona Chapel at the Polytechnic University of Catalonia in Barcelona, Spain. From the outside, Torre Girona Chapel looks like any one of the thousands of old churches located throughout Spain, with a large cross mounted on the roof and a rose window perched above the entrance. Inside is where the real excitement is going on. A shockingly beautiful supercomputer resides inside of the innocent looking chapel that has a peak computing capacity of 11 thousand trillion operations per second (11.15 petaflops)!

Heralded as the “Most beautiful data center in the world,” the MareNostrum supercomputer came online in 2005. It is one of the most powerful supercomputers in the world and is super beautiful to see.

Learn more about this modern-day marvel of divine computing in this article from Motherboard.

Learn More about Chicago Voice & Data.

Archives