The emerging cannabis industry is surprisingly technologically sophisticated. Take what I call the last mile: point of sale (POS).

I recently interviewed John Yang at California-based Treez, a POS solution focused on the cannabis industry. In fact, the free ranging conversation went so long, over two interviews, that I’ve decided to do a two-part blog series. In this first blog, I paint the picture (including taxation) and introduce Treez. In the second installment we’ll get down to the keystroke level.

Long-time friend Karl Palachuk has released a super secret tip to improve performace. Read on: 

"This might be too technical for some, but for the geeks in the crowd, here's an easy way to disable the Chrome Software Reporter Tool.

From time to time, your CPU usage may go off the charts and a quick glance shows that it's the Software Reporter Tool using 25% or more CPU.

1) In Task Manager, sort by CPU and you'll see Software Reporter Tool at the top

Flying just under the radar – Office Depot has brought to market a basic security solution, Recon Sentinel, to homes, home offices and small businesses. I’ve had the opportunity to review it and have a few “first look” observations.

1-2-3

It’s no secret I consider my

 

Everything changes so rapidly! We have evolved from the dial-up connection to superfast 24/7 available internet connection. We are globally connected with others, work from home, have friends on the different continents and travel super fast from one destination to another.

One fine day three years ago I was strolling the Olympic College campus in Bremerton Washington awaiting a fund raiser. I was talking to former Lenovo executive Chris Frey about its just completed acquisition of IBM’s server hardware business. Call me silly but I openly questioned the wisdom of investing backwards into a legacy technology business model. Fast forward the movie to today and I have an interesting update from the recently completed Lenovo Accelerate 2018 conference in Las Vegas.

Data protection comprises of a mix of services, all poised to ensure that IT environments do not experience data loss, data leakage and downtime. Data protection technologies hold a special place for Small to Medium sized Businesses (SMBs).

Rather than recycling 'seasonal' names for OS upgrades, the company changed things up this time around.

Microsoft Windows 10

Microsoft will start distributing the next Windows 10 feature upgrade, "Windows 10 April 2018 Update," today - a few weeks later then it had been expected to arrive.

Microsoft adds capabilities to the Visual Studio IDE almost every month. Here's what you can expect for the rest of 2018.Microsoft adds capabilities to the Visual Studio IDE almost every month. Here's what you can expect for the rest of 2018.

By Paul Krill

Editor at Large, InfoWorld | APRIL 26, 2018

Arnav Kapur

 

Arnav Kapur, a researcher in the Fluid Interfaces group at the MIT Media Lab, demonstrates the AlterEgo project.
Credit: Lorrie Lejeune/MIT
MIT researchers have developed a computer interface that can transcribe words that the user verbalizes internally but does not actually speak aloud.

We’ve entered a new era of cyber threats. It’s like no other that’s gone before, in that CISOs must battle not only the huge volume of “old threats” out there but also a growing array of stealthier new attacks designed to circumvent traditional tools. These could include certain types of targeted attacks, ransomware, zero-day threats, and even business process compromise. And they have to deal with a much larger attack surface created by cloud, mobility, and riskier user behavior. We’ve entered a new era of cyber threats. It’s like no other that’s gone before, in that CISOs must battle not only the huge volume of “old threats” out there but also a growing array of stealthier new attacks designed to circumvent traditional tools. These could include certain types of targeted attacks, ransomware, zero-day threats, and even business process compromise. And they have to deal with a much larger attack surface created by cloud, mobility, and riskier user behavior.