From bayonets to drones, the landscape of warfare has constantly evolved. The first stealth submarine was built during WW2, covered by a special rubber coating that made it difficult to detect by sonar. Users of this aquatic advancement were considered to be cheating on a battlefield others thought to be fair. Jumping forward to the […]
Watch the Recap Video Here Laughter between old friends, drinks that keep on coming, melt in your mouth brisket, and an outrageously comfortable carpet. Although these things sound like the makings of an excellent dinner party, those were the sights, sounds, and smells permeating NRECA’s TechAdvantage 2022 conference in Nashville, TN. Considering it had been […]
By Jared Patton Ian Murphy, alias Captain Zap, was the first person in history to be arrested, charged, and convicted of a felony cybercrime. In 1981, Murphy and three friends hacked into the servers of a young AT&T corporation, changing internal clocks to alter metered billing rates. This was a simple task considering that the […]
Driven by Passion for Advanced Analytics and Co-op Enterprise Software Excellence A Bundle of Energy Kelsey Gustainis is from Tulsa Oklahoma and was always very good at math. She admits she had no idea, back in high school, what engineering really was. As Gustainis says, “All I knew was that I didn’t want to be […]
SERVICE TRANSFORMED Meridian’s Customer Portal gives utilities the ability to set up a branded, customizable website that can bring together data from multiple systems and sources. Consumers can access specialized payment capabilities, account alerts, billing information, important announcements and more, securely online with no need for the utility to invest resources into a taxing web […]
In any computer system, the largest vulnerability and easiest way for bad actors to gain access is by tricking unsuspecting users. Attackers use many methods, from sleight of hand to direct, personalized appeals to fool users into dropping the ball. Now more than ever, businesses must invest not only in reliable cybersecurity solutions but in […]