Entries by

Redwood Materials to process batteries and solar panels recycled through ERI

Electronics recycler ERI and Redwood Materials are partnering on both battery and solar panel recycling. Redwoods Materials, co-founded by former Tesla CTO JB Straubel, is dedicated to handling e-waste responsibly. “ERI and Redwood Materials working together signals a unique, unprecedented partnership that will tackle the ‘last mile’ of electronic recycling: solar panels and batteries,” said […]

The state of digital transformation in Malaysia

In late 2020, Forrester fielded a Forrester Analytics Business Technographics survey in two key Southeast Asian markets to understand the current state of digital transformation and cloud adoption. This content looks at the state of digital transformation in Malaysia.  Only 46% Of Firms In Malaysia Are On A Digital Transformation Journey  A minority of firms […]

Pennsylvania Senate considers bipartisan community solar legislation

State Sen. Mario Scavello has introduced legislation that would deliver a more than $1.8 billion boost to Pennsylvania’s economic recovery effort, benefiting farmers, small businesses, electric ratepayers, and municipalities throughout the commonwealth. Senate Bill 472 would authorize the development of small-scale community solar projects and would enable more than 200 shovel-ready projects to quickly break […]

Tax time reminder: Why printing is not dead

Earlier this week, I made the case for scanning all of your documents. I showed you that not only having a way to store and retrieve tax documents, but also being able to get to all your critical business documents online, could be of great value. All that is true. But sometimes you still need […]

IoT News – Sierra Wireless Announces Ransomware Attack

Sierra Wireless, the world’s leading IoT solutions provider, today announced that it discovered it was the subject of a ransomware attack on its internal IT systems on March 20, 2021. Once the company learned of the attack, its IT and operations teams immediately implemented measures to counter the attack in accordance with established cybersecurity procedures […]