Key facts about U.S. Hispanics and their diverse heritage

10 Facts about US Latinos for National Hispanic Heritage month

As an MWBE and business with Hispanic roots and heritage, Compulink is excited to celebrate National Hispanic Heritage month. Latino small-business onwers like Compulink are one of the fastest-growing groups of entrepreneurs in the US. Latino business owners grew by over 34% compared to 2010, yet still only make uo 1% of all business owners in the US, which is why it is so important to keep supporting these businesses as they continue to find their footing as key contributors to the US’ economy. To celebrate one of the nation’s fastest growing racial groups, we gathered 10 facts about US Latinos in honor of the monthlong celebration.

  1. The US Hispanic population reached over 62.1 million people in 2020, a 23% increase from 50 million when it was last recorded in 2010 (source: Pew Research).
  2. National Hispanic Heritage month began as a week-long celebration under President Lyndon B. Johnson in 1968, but was expanded to a month under President Ronald Reagan in 1988.
  3. National Hispanic Heritage month begins on September 15 and concludes on October 15.
  4. September 15, the day the monthlong celebration begins, plays a significant role due to the corresponding anniversaries of independence on the same day for the Latin American countries Costa Rica, El Salvador, Guatemala, Honduras and Nicaragua.
  5. Mexico and Chile also support their independence days on September 16 and September 18, respectively.
  6. Those with Mexican ancestry account for more than 62% of the total Hispanic population in the US (pew research)
  7. North and South Dakota have seen the fastest growth in their Hispanic Populations since 2010 (pew research)
  8. National Hispanic Heritage month honors the cultures, stories, history and impact of US citizens whose ancestors originated from Spain, Central America, Mexico, the Caribbean, and Central and South America.
  9. Hispanic Americans are the nation’s second-fastest-growing racial or ethnic group after Asian Americans (pew research).
  10. Over 80% of Latinos are US citizens (pew research).
Read More

Top 5 Reasons to Utilize a Managed Security Service Provider

Investing in a team of internal cybersecurity experts can be costly, due to the amount of resources dedicated to training, solution upgrades and salary costs. SMB’s and medium-sized businesses are starting to see the increased value in outsourcing their security needs to a managed security service provider for a variety of reasons. Here are the top five reasons to utilize a managed security service provider:
  1. Cost Savings – Cybersecurity is one of the most in-demand positions in the field of IT, and as such, it is also one of the most expensive positions to fill. By hiring out to a MSSP, your team is guaranteed to save money on salary fees, training requirements and other costs associated with hiring an internal security team. Managed security service providers bundle these costs together so that you are able to forecast your budget ahead of time with pinpoint accuracy, and your team always has the option to scale your monthly package up or down, depending on your needs.
  2. Advanced Protection from Threats – Cybersecurity hackers are constantly evolving with the sophistication in their attacks. That is why is so important for businesses to have the latest software and upgrades installed on their network, so that they are protected from the threat of attacks. By hiring out your security needs to an MSSP, your team will never have to worry about updating, installing or purchasing these tools because your MSSP will handle this and will have the insight into what the best tools are as well for your particular environment. 
  3. Rapid Response to Threats – The beauty of hiring an MSSP is that your environment will be closely monitored 24x7x365, so if there is ever a security incident, your team can rest assured that your MSSP will respond to the threat instantly. 
  4. Compliance – Industries like healthcare and the government require security compliance measures, or else they risk fines and penalties. By outsourcing to a company that has a strong knowledge of government compliance and security like Compulink, your team can rest assured that your infrastructure is not only secure, but is also meeting HIPPA and government regulation standards. 
  5. Rest Easy – By outsourcing your security needs to a managed security service provider, you not only save money, get the best tools and have continuous monitoring, you will also have a team of security experts at your disposal that will become an extension of your own team. Let’s face it, monitoring security threats all the time can be exhausting and time-consuming. With our team of security experts, you can rest easy knowing that you are protected so you and your team can focus on other mission critical areas of your business. 
Read More

Top 5 Benefits of Utilizing a Managed Cloud Service Provider

The cloud is the answer for most companies looking to enhance their IT estate, but cloud-based environments also require constant maintenance, support and monitoring in order for them to be effective and secure. By outsourcing these tasks to a managed cloud service provider, like Compulink Technologies, companies can maximize the potential of the cloud and save money and time. Here are the top five reasons why you should utilize managed cloud services. 

  1. Future Technology – By utilizing a managed cloud service provider, you are guaranteed to have the best cloud technicians and engineers working on your environment. There are constant updates, upgrades and new technologies being released and it can be costly and time consuming to train internal staff to support these new releases. Having an expert team of cloud engineers at your disposal means that you and your team can focus on other mission critical areas of you business while still having the latest technology at your disposal. 
  2. Security – It can be difficult to secure a cloud-based environment due to the sheer size and complexity of where your assets live in your environment. These vulnerabilities can expose your network to malicious hackers that exploit the ‘entry points’ to your network if they are not secured properly, which can lead to serious risks for your business. By having a team of cloud experts managing your security, you can be assured that your entire network is fully secured and that there aren’t any exposed areas such as hacking into a printer and getting access to your entire network (one of the most common entry points for cyber attackers). 
  3. Save Money – Maintaining and managing a cloud-based environment can be very time-consuming and costly. Leveraging a managed cloud service provider, like Compulink Technologies, Inc., can help your staff by freeing up their time to focus on other critical areas of your business. Most of the time staffing a full-time IT department can be costly and unnecessary for certain small and medium-sized business, so outsourcing to a managed cloud service provider can help save time and money while also getting access to engineers with high-level expertise in cloud computing. 
  4. Flexibility and Predictable Costs – Once you and your managed cloud provider have had a consultation and devised a plan to support your business needs, you can expect to pay the same monthly costs throughout the year without any deviation. This can be extremely beneficial for being able to accurately forecast your budget needs throughout the year and allows you and your team the peace of mind that extra costs won’t be tacked on unknowingly. And if for some reason your team needs to either upgrade or downgrade your monthly plan, you can do so at any time and still receive an accurate, consistent cost associated with whatever route you decide on. 
  5. Compliance Support –  Government institutions and healthcare providers need to remain compliant with industry regulations, or else they can lead themselves into serious trouble. By outsourcing to a cloud managed service provider like Compulink, we can help you stay compliant and ensure you are in accordance with industry regulations. 
Read More

The Food Industry May Be Finally Paying Attention To Its Weakness To Cyberattacks

This article was originally published by NPR. To view the original article, click here

A recent ransomware attack on the world’s biggest meatpacker is raising questions about cybersecurity in the food industry and about whether the industry is so concentrated in a few hands it is more vulnerable to sudden shocks.

The company, Brazil-based JBS, is a giant in the meat industry, with operations all over the world. The attack forced it to shut down several plants in the U.S. and Australia, which briefly rattled beef markets. But the plants soon came back online, and JBS downplayed the impact, saying it lost less than a day’s worth of production. The company admitted it had paid $11 million in ransom to the hackers.

But according to John Hoffman, a senior research fellow at the Food Protection and Defense Institute at the University of Minnesota, the attack has continued to reverberate. Hoffman says he’s receiving a wave of inquiries about cybersecurity from industry executives who previously were inclined to disregard his warnings.

“People just didn’t accept that it was that big of a risk,” he says. “I think that’s changed today. I’ve already heard from folks in government [that] it’s changed. People are looking at this and saying, ‘OK, we’ve got to do something.’ “

According to Hoffman, many food companies’ computer systems are vulnerable. “If you go to factory floors around this country, you’re going to find a wide range of outdated software still being used, and computer devices that aren’t secure,” he says.

He recalls a visit to one plant a few years ago — he won’t say which company — where he noticed a supervisor sitting at a computer on the production floor, monitoring operations. Hoffman could see it was running an old operating system, Windows 98. He asked the plant manager and a top executive of the company, who were giving him the tour, whether the computer was connected to the internet. “And they say, ‘Oh, no, no. This isn’t connected to the internet.’ “

Hoffman then talked to the supervisor on duty, who acknowledged he could log into that computer from home to monitor and control equipment in the plant. The company hadn’t taken steps to secure that access using, for instance, a virtual private network, or VPN.

“There it is. That’s the definition of vulnerability,” Hoffman says. In fact, food itself is vulnerable, because those computers “are controlling valves and monitoring temperatures, controlling mixes of additives to food. These are part of food safety.”

Hoffman has been pushing for the government to enforce computer security standards in the food industry in the same way it enforces food safety standards. Currently, food safety regulations don’t explicitly address cybersecurity.

Other longtime critics of the meat industry, such as Diana Moss, president of the American Antitrust Institute, are drawing another lesson from the JBS attack. Moss says the industry is too concentrated in the hands of too few companies, so a problem in just one company can disrupt supplies for millions of consumers.

“What we have, in the meat supply chain, is a cartel,” she says. Just four companies, including JBS, slaughter about 85% of the country’s cattle that are raised for beef. Those companies operate giant, centralized slaughterhouses. Moss says a small number of companies also dominate chicken production, flour milling and other kinds of food processing.

“When you have only a few firms, in this critical midstream part of the supply chain — processing, manufacturing — the supply chain becomes very unstable. It lacks resiliency and is very subject to shocks to the system,” she says.

The biggest recent shock was the COVID-19 pandemic when the coronavirus spread rapidly among workers at meatpacking plants. Hundreds of workers died. Companies were forced to suspend operations at some of the largest processing plants, leaving many ranchers and pork farmers with no place to take their animals.

Kathryn Bedell, a rancher in Colorado, says that 60 years ago, “processing was more regionally distributed, and we would have never faced this problem. You wouldn’t have noticed either the pandemic or the JBS [ransomware] problem.”

The U.S. Department of Agriculture appears to be sympathetic to these arguments. The USDA is offering grants to support small and medium-size meat processors, and it recently asked for public comment on ways to build “more resilient, diverse, and secure supply chains.”

The North American Meat Institute, which represents meat producers such as JBS, says the existing supply chain is already resilient. Mark Dopp, NAMI’s senior vice president of regulatory and scientific affairs, told the USDA that during the pandemic, “the industry fared reasonably well in extraordinary circumstances,” and that “suggestions that the government needs to step in and ‘do something’ may be trying to fix something that is not broken.”

A NAMI spokesperson pointed out that the cyberattack on JBS ultimately caused little disruption and said that meat companies reacted immediately to that attack and reviewed their own computer systems to ensure they were secure.

Read More

What is Juneteenth?

As a certified MBE and MWBE, Compulink Technologies, Inc. is excited to hear the recent news that Juneteenth has been recognized as a National Federal Holiday. 

What is Juneteenth?

We’re glad you asked. Juneteenth marks the official end of slavery in the United States. 

I thought that was the Emancipation Proclamation? 

Yes and no. The Emancipation Proclamation was signed into effect by Abraham Lincoln on January 1, 1863, which declared that “all enslaved people in the States, henceforth, would be free forever.” While this signaled the end of slavery in the United States, it did not become official until when a Union General by the name of Gordon Granger travelled south to Galveston, Texas on June 19, 1895 and informed enslaved African-Americans of their freedom and end of the war. General Granger’s announcement put into effect the Emancipation Proclamation and marked the end of slavery in the United States as we know it. The holiday received its name by combining June and 19, the day of Granger’s announcement. 

Interesting. How is it celebrated today? 

Lots of ways. The holiday was originally celebrated in Texas as a way to commemorate the final domino pieces that toppled that would end slavery in the United States. Since 1979, the holiday has been recognized and slowly gained traction, state-by-state. Today, the bill has been signed into law as a national holiday and there are many cities such as Atlanta, Los Angeles, and Detroit that host city parades and other festivities.

Conclusion:

Today we celebrate this momentous event in American History, where we can catch our breath and see for ourselves the positive changes that have taken into effect throughout our past. We must never forget our history, and we must always strive each day to make our promise to make this nation a place where all people are created equal.

Read More

The History Of 3-D Printing

This article was originally published on PCGuide.com | 

3-D Printing

Despite being around for the better part of 40 years, 3D printing is still a relatively new technology that most home consumers are still yet to learn the benefits of. It’s still thought of as a concept that was cherry-picked out of a science fiction movie without any real merit.

It’s an assumption that couldn’t be more true, as 3D printing has actually undergone a number of exciting developments over the last couple of decades. Even still, there are probably many who are wondering, “what is 3D printing? What can it do for me?”

These questions (and many more) are exactly what we at PC Guide are here to answer. This page is your hub to everything you need to know about the world of 3D printing, its history behind 3D printing, and its uses today.

History Of 3D Printing

Whilst you might assume that 3D printing is still in its infancy, which in some ways it very much is, additive manufacturing technology has actually been around for the last 40 years.

The Financial Times has recently reported it as being “bigger than the internet”, which goes to show how technology can evolve and develop over time into what they are today.

You can date the earliest record of 3D printing back to May 1980, when Dr. Kodama filled out a patent application in Japan, but you can trace it further back to its origins in 1986 when Charles Hull patented his stereolithography apparatus (SLA). He then went on to co-found 3D Systems Corporation, which is now a household name in the 3D printing industry.

It was this company that created one of the first machines to utilize 3D printing technology, and they’ve only gone on to develop their products and make new strides in this field.

However, it might interest you to know that only in the late 1990s was 3D printing truly acknowledged for the potential you see it beginning to touch upon today.

Since then, there have been major efforts to better understand this technology.  One example of this was in 2005 when it became apparent that 3D printers had evolved to the point where they could basically build themselves. Who knows where we’ll be with it in another twenty years!

What Is 3D Printing?

3D printing is the production of parts and system components which are typically stronger, better quality, and more lightweight compared to their more traditionally printed counterparts.

What this essentially entails is the creation of a three-dimensional digital design by layering material on top of itself in order to build a physical model that replicates this design exactly.

At its core, additive manufacturing technology provides the basis for 3D printing, which is an entirely new and unique printing process compared to anything else currently on the market.

This is different from subtractive manufacturing, which is the process of cutting out sections of a type of material such as metal or plastic, using a tool like a milling machine, for example.

In order for 3D printing to work, you’ll need to design your digital model.

There is a wide variety of software available that you can use to design your 3D model, each with a number of different tools ranging from industrial level to open source.

We believe the best software to start out with when you’re still learning the ropes of 3D printing is Tinkercad, which is free and can be used in-browser without needing to install it.

There are lessons offered for beginners and once designed, you can export your model as a printable file, like .STL or .OBJ, for example. Once the file is ready, you will need to get it prepped and ready for your 3D printer, which is what’s known as slicing.

In order to be ready for printing, your 3D design needs to undergo a process called slicing, done using special slicing software. This essentially means your 3D model is sliced into thousands of layers, ready for your 3D printer to layer the material as it builds your design.

Your digital design turned printable file will now be ready for printing, and you can transfer the design to the printer via a USB, SD, or Wi-Fi connection.

Read More

Blog Post Title

What goes into a blog post? Helpful, industry-specific content that: 1) gives readers a useful takeaway, and 2) shows you’re an industry expert.

Use your company’s blog posts to opine on current industry topics, humanize your company, and show how your products and services can help people.

Read More

Compulink Technologies Now A Lot 3 (Cloud) Vendor For Cisco’s NYS OGS Contract!

Compulink Technologies has recently been awarded as a lot 3 vendor for Cisco System’s New York State OGS Contract! Lot 3 is Cloud Services and this means that Compulink can sell cloud products and services to New York City and State public institutions while leveraging the OGS Contract.

Compulink Technologies holds a strong, longstanding relationship with both Cisco Systems, and the procurement community in New York. As we reach a new normal under the novel COVID19 pandemic, we need to become flexible with how we approach IT. This includes having a hybrid approach to our IT environments that enable our teams to access their work and data from anywhere. Since the need for cloud services is quickly growing across sectors, we are excited to become an IT Resource to public institutions, and small-medium sized businesses.

Under Lot 3 of Cisco’s OGS Contract, Compulink is able to better assist with the following solution sets:

Cisco Flex

Get cloud, on-premises, and hosted collaboration in a user-based subscription. You can buy meeting, team collaboration, calling, and contact center services for all employees, or simply purchase what you need today and grow at your own pace. With the Flex Plan, one agreement includes software, upgrades, and support.

Cisco Webex Meetings

Don’t let being away from the office slow your business down. Experience engaging, productive meetings from wherever you are.

Cisco Webex Meetings delivers over 6 billion meetings per month, offering industry-leading video and audio conferencing with sharing, chat, and more. 

General features:
• Join and present from any meeting, event, or training session
• Hands-free voice commands with Google Assistant and Google Home Hub
• Seamless joining directly from your calendar or customizable widget
• Schedule meetings or playback recordings directly from your app
• Customizable video layouts
• Share your screen to everyone

 

If you have not considered cloud solutions for your organization’s IT environment yet, do learn more about it! Contact the Compulink team to learn more about how cloud solutions can benefit your IT environment!

Read More

IT Concerns About Consciousness In The Cloud

In May 2020, Amazon Prime Video released a new show called Upload. The premise of this show was that it was in the future, and there is a new technological tool called “Upload” sponsored by the company Horizon Technologies that enabled individuals to extend their lives by uploading their consciousness into the cloud. They navigate the digital atmosphere through their avatars which are designed to look like them. Uploads also need to pay for perks such as food, drinks, stay, and other types of experiences in their environment. The characters escape into the deep web to purchase illicit services and upgrades for their avatars.

The show delves into many interesting philosophical questions such as whether the uploads are actually alive or deceased, and the ethical connotations of individuals living in the physical world developing a connection with the “deceased” who are uploaded into the cloud.

There was one interesting incident in the show that was worth noting if you follow information technology. The uploads are all stored in a datacenter located on-premise. So this was a hybrid cloud. In this incident, an unknown character attached a device to the datacenter that caused a shock throughout the network. This affected the entire graphics of the system and put the overall digital atmosphere at risk.

As part of the IT industry, the disruption in their datacenter was alarming. I have come up with a few suggestions for IT environments that will be handling these types of software-based consciousness:

Disaster Recovery and Backup

If the data you are storing in the cloud is vital to your organization, as it is for most, then disaster recovery backup solutions are essential to have in place. With the proper disaster recovery solution, your data will be protected during emergency disasters. Typically in a disaster recovery solution, when a datacenter faces a physical or cyberthreat, the data automatically transfers into another datacenter in a separate location. In the show, if Horizon Technologies had a disaster recovery in place, the sensitive data (human consciousness) would be well protected in the event of a disaster.

Cybersecurity

Since in this show, human consciousness are digital entities, they are prone to cyber attacks. The uploads interact directly with their customer service personnel which are individuals in the physical world. The customer service professionals work through a user interface on their office desktops and speak through a microphone and virtual reality gear.

This direct interaction on the office desktops can make the programs vulnerable to threats. In the employees’ desktops, there can be a cyber breach via phishing emails, or web access. To take preventive measures against this vulnerability, the company should adopt high-level firewalls (which they probably already have), email security gateways, and insider threat detection. This can help protect some of the actual lives at stake in this cloud environment from cyber breaches that can literally impact their conscious existence.

In Summary

Every IT environment has delicate data involves sensitive work for the organization involved. In this case, the data are the extension actual human lives and conscious realities. So when it comes to a product as crucial as this, it is important for the decision makers of the organization to develop a robust, IT solution with attention to security and data recovery.

This is not isolated to the fictional company in the television show. It applies to all different types of companies in reality as well. Every company and organization deals with products, services, and data that are sensitive and require protection measures. It is vital for IT and management to align on their environment in order to ensure business continuity, and overall protection of the organization at large.

Read More

Classroom Management Is Now an IT Matter

The recent COVID19 Pandemic has proven to us that education is an important cornerstone of our society. It is economically crucial to have an educated populace in order to boost the exchange of ideas and help advance areas of society such as technology, science, public policy, etc. In order to maintain quality education; the necessary IT tools and resources need to be made available. Nowadays, schools have adopted remote learning. HP Inc.’s Classroom Manager is a trendy solution that we found would benefit education tremendously.

It is not uncommon to find situations where teachers and students are all in a room full of computers doing work together. However, when students are engaged with the computers, distractions can easily arise. Students can be working with other types of content instead of the main lesson at hand and the educational effort of the teacher would be wasted. HP’s Classroom Manager can address this ordeal.

With Classroom Manager, educators can manage the content that students are exposed to and both teachers and students can share screens. Students can share their screens to present their work to the rest of the class. Teachers can also share their content, avoiding a disconnect on the learning process between the students and the teachers.

Here are the following features teachers have from this solution:

  1. Lock/unlock: Ensure students focus by locking student screens
  2. Blank all: easily clear all students’ devices with a click
  3. Message: Send messages from the teachers’ device to one or all student devices selected.
  4. Help Requests: Students can discreetly alert the teacher when they require assistance.
  5. Student Screen monitoring: View all student screens from the teacher’s PC. Double-click to take control
  6. Q&A: The Question and Answer mode enables the teachers to conduct both individual student and peer assessment scores.
  7. Web Launch: remotely launch a selected website on student devices.
  8. File Transfer: Teacher can quickly transfer file to one or multiple students

This collaborative solution can keep classes synchronized when it comes to the educational progress. HP’s Classroom Manager is a tool for teachers. While the current pain point is that centralizing the productivity has its challenges with every student and teacher in a different location, HP’s Classroom Manager can fine tune how the teachers and students get their point across and make for an improved remote learning experience. Social distancing does not have to mean a reduced quality of education.

For more information on Remote Deployment, click on the image below!

Read More