Subscribe

Cybersecurity
“The enemy with no face”. No, it’s not the latest Dwayne “The Rock” Johnson Hollywood action movie, but the tagline from the U.S. Army’s latest cyber warrior recruitment ad.
Digital Design
The use of BIM for infrastructure in the U.S. is well on the way to becoming established for transportation projects. These are the findings of a new SmartMarket Report – The Business Value of BIM for Infrastructure –  from Dodge Data & Analytics and DLT partner, Autodesk.
Digital Design
Just installed Civil 3D 2017? Maybe just downloaded Civil 3D 2017 v1? Well never fear….2018 is here!! That was somewhat sarcastic, but I do some see much needed improvements to AutoCAD 2018 and its vertical products such as Civil 3D. You saw throughout the year with most Autodesk products that you get more periodic updates. Civil 3D 2017 v1 was a great update and I see this trend continuing. This article looks at some of the top new features within AutoCAD Civil 3D 2018 and may help you make your decision to download and install today.
Cybersecurity
As the worldwide fallout of the WannaCry ransomware virus continues and the blame game starts, the worldwide attack underscores the need for basic security hygiene, updating of operating systems, and regular patching writes DLT Chief Cybersecurity Technologist, Don Maclean.
Data & Storage
Hybrid clouds are increasingly seen by government agencies as a comfortable solution to both their desire and mandates to move to the cloud. Highly sensitive data can be stored on-premises in a private cloud – using their existing infrastructure – while lower risk data and non-sensitive computing workloads can be placed in the public cloud or where they fit best. Hybrid clouds also let agencies quickly move when situations change.
Cybersecurity
On May 12 a ransomware virus, WannaCry, was released on the Internet and rapidly spread to hundreds of thousands of Microsoft Windows based computers in over 150 countries.  The malware encrypts critical files on a computer, such as Excel, Word, and other important files, and seeks out backup copies for encryption as well.  Once it infects a system, it requires the victim to pay approximately $300 in digital currency (Bitcoin), and immediately tries to find other systems to infect.