2024 Calendar
2025 Calendar
TechTalk Daily

News

AMD vs. NVIDIA: Dueling CES Keynotes

CES is back. From the look of things, attendance is much stronger than it was last year, even though concerns about the latest Covid 19 variant have kept folks like me away again. What interested me early on was the contrast between NVIDIA's and AMD's keynotes. For once, NVIDIA’s CEO was absent (except as a virtual avatar) and the keynote was canned (and streamed). The AMD keynote was led by its CEO in person with an audience and was promoted by CES leadership. 

Let’s contrast the two events and how the two once-similar companies are starting to significantly diverge in terms of focus and strategy. We’ll take a look at the advantages and disadvantages of each unique approach. 

By Rob Enderle, Enderle Group

See More

Great Power Competition: The Stealth War Between China, Russia, & The U.S.

Interview with Rex Lee, Privacy and Cybersecurity Advisor

See why all social media platforms, including those from China and Russia, are a massive privacy and cybersecurity threat to your personal and business information due to the fact that all developers concerned are in the "information trafficking business" centered on collecting highly confidential end user personal, government, and business information.

This expert panel discussion highlights the fact that unrestricted and tech hybrid warfare targets everyone, including teens, children, and government/business end users of intrusive apps and social media platforms that are nothing more than legal malware.

See More

The Centralized Internet Exodus to Decentralized Web3: Why Migrate to Web3?

By Rex M. Lee

There was a time when the internet meant freedom, opportunity, innovation, and provided information on any topic at your fingertips, that time was in the 90s before the internet was centralized by monopolies we refer to as “Big Tech”. 

Now in the era of “Surveillance Capitalism”, how can Web3 be the answer to decoupling from today's internet? 

See More

The Ultimate Gift Guide for Techies

Haven't found the perfect gift yet? Look no further! The Serious Insights Holiday Gift Guide for 2022 focuses on our best-reviewed products. They fall into a wide range of prices, from stocking stuffers to “wow, you bought that instead of a diamond ring?” 

– Dan W. Rasmus, Serious Insights

See More

CIO Priorities 2023: What CIOs need to Worry About in Early 2023, Pt. 2

Recession flags are waving heading into 2023. And technology continues to wriggle and shift regardless of economic slowdown or hope for stability.

Part 2 of a two-part series 

The following list outlines the key CIO Priorities for 2023. Any organization looking beyond six months without using scenarios to guide their visioning risks facing poor forecasts amid multi-vector volatility. Once you read the list, you’ll see these concerns will drive action far in the future and prove plenty to keep even the most adept CIO busy for the next six months.

– Daniel W. Rasmus, Serious Insights

See More

CIO Priorities 2023: What CIOs need to Worry About in Early 2023

Recession flags are waving heading into 2023. And technology continues to wriggle and shift regardless of economic slowdown or hope for stability.

Part 1 of a two-part series 

The following list outlines the key CIO Priorities for 2023. Any organization looking beyond six months without using scenarios to guide their visioning risks facing poor forecasts amid multi-vector volatility. Once you read the list, you’ll see these concerns will drive action far in the future and prove plenty to keep even the most adept CIO busy for the next six months.

– Daniel W. Rasmus, Serious Insights

See More

How Qualcomm's Oryon Processor Could Be the Ideal Counter to Apple's M1/2

 By Rob Enderle

This week was Qualcomm’s annual summit in Hawaii, and for once I’m not there, which is kind of a shame because it’s really cold where I live right now. However, on paper, the Qualcomm Oryon processor due next year could be the perfect competitive answer to Apple’s M1/2 if Intel’s coming little core/big core effort is late to market, which seems likely given Intel is undergoing a large layoff.  

Oryon is based on Nuvia technology that has been somewhat problematic given ARM is suing Qualcomm for using the technology in what appears to be a suicidal effort designed to cripple this potential Apple competitor. But if launched successfully as expected in 2024, this processor could be a huge game changer.

See More

Russian & Chinese Hacker Attacks

Interview with Rex Lee, Privacy and Cybersecurity Advisor

China hacked six states and Russia hacked major airports in the United States in recent cyberattacks.

Nation-state cyberattacks are getting more sophisticated according to cybersecurity expert, Rex M. Lee, My Smart Privacy/CyberTalk TV.

Nation-state hacking groups such as China's Apt41, Russia's Sandworm, & N. Korea's Lazarus are doubling down on tech hybrid warfare exploiting vulnerabilities within the Android OS, Apple iOS, Microsoft Windows OS, and Intrusive Apps that support Smartphones, Tablet PCs, connected products, and PCs.

Cybersecurity expert, Rex M. Lee will explain how it works.

See More

Social Engineering Security Attacks: What You Need To Know Part 2

By Rex M. Lee

In my previous article, Social Engineering Security Attacks Part 1, we learned that a single security breach can cost an organization between $4.5 - $10+ million dollars, and that’s just to research the breach, according to IBM’s 2022 Cost of a Data Breach Report.

Part 1 highlighted some of the most common social engineering attacks. However, there are other attack vectors associated with social engineering attacks that we will examine here.

Social engineering attacks are simply defined as attacks centered on taking advantage of human psychology through deception in order to acquire confidential and protected information. 

See More

Social Engineering Security Attacks: What You Need To Know

According to IBM’s 2022 “Cost of a Data Breach Report”, aside from legal fees the average cost of a breach is approximately $4.5 million dollars globally and nearly $10 million dollars in the United States. Furthermore, the report states that 90% of all breaches occur due to human error. Although these types of attacks are nearly 100% preventable, most companies do not have the right incident response policies in place to prevent these attacks in the first place.

– Rex Lee, Privacy and Cybersecurity Advisor

See More