IT Risk: some figures The latest report published in March by Clusit (a well-known Italian observatory on security issues) leaves no room for doubt. In the context of a generalized increase in cyber attacks at a global level (the most serious ones against companies and institutions went from 1550 in 2018...

We are thrilled to congratulate Olimpia Milano, a prestigious Italian basketball team of which BinHexS has been a sponsor for several years, on their extraordinary success in winning their 30th Italian Championship! This important achievement not only reflects the team's unwavering dedication and exceptional skills, but also highlights the rich...

Like what has already happened with payments via POS, the electronic receipt and the telematic transmission of transactions have now become an obligation for every retail business, a means, chosen by the legislator, to counter tax evasion and digitize checks otherwise too expensive. An obligation that came into force, after...

Application software ages over time like the IT architectures used to support it. Technological evolution makes it necessary to update systems to continue obtaining support from suppliers and reduce IT management costs. On the other hand, there is a need to obtain power and flexibility to accommodate new processes and...

According to recent surveys by the Clusit observatory on security, 67% of Italian companies recorded an increase in cyber attack attempts last year and 14% suffered more or less serious consequences from an economic point of view. A situation that is not destined to improve this year by placing the...

Italian and multinational companies often encounter major problems in managing the diverse universe of mobile, fixed, and accessory systems, network devices, software and services that serve to ensure effective digital supports for their employees. The dream of relying on IT assets that are easy to manage through consistent choices in...

In the age of online business, disaster recovery remains an indispensable safeguard for protecting IT systems and business operations. A trivial failure, as well as a cyber-attack, can render data and applications inaccessible, halting the operations of individual departments or the entire company, resulting in significant economic and reputational damage...

The digital transformation applied to the world of healthcare brings both the promise of improving the quality of services to citizens and speeding up the search for better therapies and pharmacological cures. It is indeed from the collection, classification, and analysis of data produced by modern diagnostic systems collected along...

There are many situations today in which, due to network latency issues or the amount of data involved, the elaboration must be performed as close as possible to the sources or to the users, whether it is humans or machines. These are the contexts of the use of edge computing,...