Blog

ECHO’s been getting a lot of questions lately from clients with security concerns. This isn’t surprising, given the high-profile breaches that have resulted in most of us having to think about our relationships with companies we trusted to keep our information safe. As if taking...

In the past, privacy was something we took for granted. We had one phone line at home and a ham radio network, perhaps. All of our communication was under our control and easy to disable. Today, communication has become far too complicated. We are surrounded...

The Harvard Business Review recently posted an article [SW1] covering the tremendous value for companies to have products with an open application program interface (API). We agree, in today’s technical environment, products with open APIs are much more desirable and powerful. In addition to revenue generation for...

Most of us share a perception of wireless networking that would result in an immediate dismissal of that statement.  The sad reality of wireless networking is that when it works well, it usually works well by accident or happenstance: a small number of clients, all...

If 2015 taught us one thing, it’s that information just isn’t safe anymore.  Last year may well have been the turning point for cybersecurity – the year in which hacks not only became commonplace, but started to hit businesses and governments in newly tangible (and costly)...

THE BIG QUESTION Can technology save the world? At ECHO, we think so, and we are investing time and collective gray matter to test that hypothesis. We live in the age of the toaster, the microwave oven, and home automation systems which allow us to control our...