Single sign-on (SSO) is an important element in the complex structure of an effective security program. It is a service that gives a user access to multiple network destinations by...
Read More
RenovoData was featured in the 3PL Perspectives publication (November Edition) with this article, which is part THREE of the three-part series that addresses cybersecurity. This final article covers a higher...
Read More
The term digital transformation represents today’s continuous proliferation of digital technologies, and it also points to the speed with which they are being integrated into every area of activity. On...
Read More
RenovoData was again featured in the 3PL Perspectives publication (October Edition). 3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. This article, written by RenovoData's Michele...
Read More
RenovoData was featured in the 3PL Perspectives publication (September Edition). 3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. This article, written by RenovoData's Michele Vayle,...
Read More
In recent years, the cloud has become a major part of the IT landscape, bringing many benefits and a wide variety of options. In addition to virtually unlimited data storage,...
Read More
RenovoData was featured in the June 2018 edition of 3PL Perspectives. The article includes a series of facts about how blockchain works and what makes it so widely used, but...
Read More
The TIA (Transportation Intermediaries Association) Conference always has incredible education series. This year, once again, we were asked to join an industry panel of experts, including our own Chuck Cook...
Read More
Although blockchain technology has generated a lot of buzz, it is not widely understood. To begin with, the blockchain concept is not entirely new. Instead, it is an updated version...
Read More
RenovoData was featured in the Logistic Journal's November edition. The article provides expert-level detail on cyber threats and provides three steps that can help to protect your data. Read Article...
Read More