How vulnerable are US voting machines to foreign hackers?

Aug 10, 2016

How vulnerable are US voting machines to foreign hackers?

The recent hack of Democratic National Committee computers, attributed by authorities to Russia, has many Americans worried about foreign influence swaying the upcoming presidential election.

The DNC breach provides an excellent example of political doxing. This co-opted 1990s hacker revenge technique employs extra-legal methods to acquire and publish an individual's personal information on the internet, computer security expert Bruce Schneier explained in an article for Motherboard. What's more, according to Schneier​, political doxing is trending among cybercriminals.

Following the initial theft of DNC emails and opposition research on Republican Presidential Nominee Donald J. Trump, anti-secrecy website WikiLeaks issued approximately 20,000 internal DNC emails, Rebecca Hersher reported for NPR.

The emails, along with subsequently released stolen voicemails, indicated that high-level DNC staff actively favored Hillary Clinton during the primary election, Tom LoBianco and David Wright reported for CNN. In the wake of this leak, DNC Chairwoman Debbie Wasserman Schultz offered her resignation, an embarrassment on the eve of the Democratic National Convention where Clinton accepted the party's presidential nomination.

Fears that the Russian government may use cybercrime to ensure a Trump presidency are swirling after Trump's suggestion that Russian intelligence should similarly acquire missing emails from Clinton's tenure as Secretary of State, LoBianco and Wright reported. Trump later claimed the comment was sarcastic, and Russian authorities deny any involvement in the DNC hack. However, many still raise the question of whether Russia might look to cyberattacks to influence the 2016 U.S. presidential election.

Electronic voting technology

Political doxing represents an eye-catching weak point in the American electoral system, but a quieter risk to ballot security lies in the age of voting machines. While electronic voting technology is hardly a new concept - the 2002 Help America Vote Act mandated that each county make a minimum of two electronic ballot boxes available to residents - most people might expect to find the most up-to-date technology when they head to the polls.

However, the reality disappoints. A 2015 report by the Brennan Center for Justice warned that modern voting machines differ from their predecessors in that they are not intended to function for decades. According to the report, equipment purchased after 2000 is expected to last between 10 and 20 years. Most electronic ballot boxes that debuted at the turn of the century were designed in the 1990s, creating several problems: Chiefly, the report asserted, as of 2016 43 states are using machines 10 or more years old, and 14 states are using machines at least 15 years old.

Not only is the technology more than a decade behind current innovations, but because of the equipment's age, finding replacements for damaged or worn-out parts can be difficult, the Brennan Center report noted. As the technology nears the end of its life expectancy, voting machines are at increasing risk of crashing.

Such errors can affect elections, Richard Forno reported in a recent Government Technology article. Forno noted that in 2004 North Carolina voting machines deleted 4,438 votes, for which there was no backup record. In the end, fewer than 2,000 votes determined the results of that same election, Cory Bennett noted in a 2014 article for The Hill.

Yet another trouble that surrounds electronic ballot boxes is the lack of funding for states to purchase updated technology. As the functionality of electronic voting machines begins to deteriorate across the country, the Brennan Center reported, 22 out of 31 states seeking to purchase new equipment in the next five years reported lacking the necessary funds. The national cost of replacing all outdated voting machines may be upward of $1 billion, the Brennan Center calculated.

What else could go wrong?

Beyond voting machine age and political doxing, U.S. elections face other technology issues. In an opinion article in The Washington Post, Schneier argued that directly influencing electronic ballots is not the only way foreign governments might tamper with a U.S. election. Schneier expressed concerns about electronic voter records, stating that foreign cybercriminals could access and delete such information.

In a May 2016 article on election fraud, The Hill's Cory Bennett also cited the security of voter data as an important issue to address. Quoting the CEO of secure digital election system advocate group Free & Fair, Joseph Kiniry, Bennett made the case that by deleting select voter registration data, hackers have the power to easily wreak havoc on elections and noted that stolen voter information is somewhat valuable in of itself, with packages of 5 to 10 million records selling for $1,350 to $2,250 on the dark web, providing a further motive to potential cyber criminals.

What's more, Bennett asserted, security guidelines are not consistent between states, and some categorize voter information as "public record." This classification means that states are not mandated to meet the federal security standards placed upon "personally identifiable information" for voter data, which is not viewed as such.

In his Government Technology article, Forno explained that electronic ballot boxes face security risks due to the voting process itself. In order to successfully serve each precinct, voting machines are spread out across their county's municipal gird. Furthermore, votes must be transferred to a higher voting office to be tallied, creating vulnerable junctures that hackers could attack, Forno noted.

In order to ensure accurate election results, Forno concluded, the hardware and the network connection linking electoral machines must be secure. In addition, the electronic ballot boxes' software and the states' local tabulating software must be able to resist cyberattacks.

What is the alternative?

Some states have opted to return to traditional paper ballots, citing security concerns. In fact, Bennett asserted, more than half the states have begun to revert to paper ballots.

A more high-tech alternative to cybercrime risks is to invest in securing and updating electronic voting machines. While Forno made it clear that he does not believe that any given piece of electoral equipment is likely to be sabotaged by a foreign government, he maintained the importance of securing voting machines to ensure the legitimacy and accuracy of U.S. elections.

The best solution seems to come when paper and digital meet in the middle. Other states can take their cue from Ohio, which passed legislation requiring all precincts to use only voting machines that generate a voter-verified paper trail, according to Bennett.

In addition, allocating funds to meet the impending costs of upgrading electrical equipment, as estimated by the Brennan Center, is also a necessary step for states to take, should they wish to maintain electronic voting machines.

In the face of election security concerns, state governments are wise to update their voting machines.

 


Tags:
Category: Cybersecurity
Add Pingback

Please add a comment

You must be logged in to leave a reply. Login »

Category List

Dell OEM Platforms (3)
Supply Chain (1)
Events (46)
Products and Services (9)
Cybersecurity (85)
Application Deployment (21)
Trade Compliance (3)
Cloud Storage (16)
Technology (61)
Research & Development (3)
Cloud Computing (55)
Systems Integration Partner (3)
Online File Sharing (35)
Demos (6)
News (27)
Ivy Bridge (1)
System Architecture (4)
Self-service portals (1)
Manuals (2)
e-Recycling (3)
Security (8)
Data Backup and Data Loss Prevention (6)
Product Lifecycle Support (3)
Survey (2)
Application Development (2)
Document Management (1)
IoT (1)
System Integration (13)
Dell Technologies OEM | Embedded & Edge Solutions (1)
Strategic Planning (9)
Digital Transformation (4)
Healthcare IT (4)
Cyber Security (3)
Compliance (11)
Collateral (2)
Collaboration (15)
Intel (10)
Mobile Device Management (32)
Data Center (34)
Health Monitoring (1)
Oil and Gas (2)
OEM Partnership (3)
Application decommissioning (1)
Appliance Model and Methodology (1)
Telecom Platform Deployment (7)
Customer Portal (1)
Defense Architecture (6)
Information Governance (5)
5G (3)
Hardware Appliance (13)
Virtualization (5)
Education (4)
Manufacturing (1)
Transparent Supply Chain (2)
Homeland Security (3)
Internet of Things (8)
Green IT (2)
Solutions (8)
Data Security (82)
Intel Xeon Scalable processors (4)
Technology predictions (1)
integration and distribution (1)
Logistics & Compliance (6)
Edge Servers (3)
Public Safety (61)
Mainframe Modernization (12)
Edge Computing (2)
Solution Overview (3)
Customer Communications Management (2)
Financial Services (2)
Transportation (19)
Industrial Automation (3)
Storage & Archive (7)
Dell EMC Servers (1)
Big Data (1)
Sales Kick-Off (2)
Data Backup (2)
Dell EMC OEM (8)
Industry News and Trends (53)
Wireless Infrastructure (31)
Global Logistics (6)
Global Support Services (11)
Dell Technologies (1)
Customer experience (4)
Application Management (4)
System and Data Management (5)
Storage and Archive (5)

Tag List

Partners (2)
Code Editor (10)
Cloud Computing (2)
PowerEdge (1)
ATCA (1)
PCI (20)
Intel Xeon Scalable Processors (13)
Database (25)
Expansion Card (3)
Performance Management (83)
Dell Technologies OEM Design Solutions Experience (1)
z/VM (16)
silver (1)
Archiving (1)
Problem and Incident Management (3)
HDDs (1)
Content Transformation (1)
Portfolio Management (5)
Datacenter, NetApp, DCOI, Compliance, data center optimization (1)
Solaris (3)
NAS (6)
Copper (17)
QuickAssist (1)
Systems Monitoring (2)
Spool File Management (9)
Smartphone (9)
Dell Technologies (4)
deep technology (1)
integration (1)
Automated Job Scheduling (6)
Macro-Level Interpreter (2)
Document Management and Delivery (164)
electronic recycling (2)
Mac (5)
Help Desk (2)
architecture (2)
Brand Protection (1)
Performance Monitoring (5)
iDRAC with Quick Sync 2 mobile-based management (1)
Storage Area Networking (SAN) (1)
Financial Services (1)
Defects (1)
Public Sector (1)
Dell (1)
Debugging (30)
Window Management (4)
Business (5)
low-power (1)
Full Duplex (19)
Automated (2)
e-waste (2)
Intel Optane SSDs (2)
Half Duplex (10)
Stand (9)
Card Reader (3)
File Sharing (10)
Dashboard (4)
Independent Software Vendors (1)
USB 3.0 (30)
Intel (8)
Federal Government (1)
CARTS Suite (10)
appliance (1)
FPGA (1)
Dell EMC OEM Storage (4)
computing (2)
56K (48)
Autonomous Driving (1)
Document Composition (13)
Skylake (2)
Batch Schedule (6)
Lewisburg (1)
platinum (1)
Internet of Things (6)
NAB (1)
Application Deployment (3)
Intel Optane Persistent Memory (2)
Cable (18)
Partnership (4)
Data Backup (12)
Line Sharing (11)
ISO Standards (2)
Knowledge base (3)
Dell EMC OEM PowerEdge 14th Generation Servers (2)
IoT Challenges (1)
Event (9)
Advance Replacement Services (1)
trade rules and regulations (2)
eReader (4)
WCDMA (5)
Cybersecurity (2)
RSA 2018 (1)
Capacity Planning (23)
Terminal Emulation (10)
V.Everything (8)
Disk Management (9)
Console Server (8)
Gigabit (22)
Whitepaper (5)
PCIe (10)
Mexico (1)
VOEM (1)
Advance Server Replacement (1)
Data protection (5)
QAT (1)
Intel 144-Layer 3D NAND Flash Memory (1)
Systems Management (18)
ExpressCard (5)
Government (2)
UNICOM Engineering Expertise (3)
2021 Dell OEM NA Partner of the Year (1)
Dell EMC (4)
Dell PowerStore (1)
Custom Server Branding (2)
Job Accounting (5)
Golf Classic (1)
Application Modernization (12)
InSync Suite (34)
Softmodem (5)
PowerEdge 14G Servers (4)
DellTechWorld (1)
Transparent Supply Chain (2)
Firewall (5)
Document Management (1)
Custom-Built Servers (1)
Data Management (69)
Modem Emulation (6)
CA 2E (5)
File Management (19)
Fiber (9)
Video Surveillance (2)
2019 Partner of the Year (1)
digital transformation (2)
z/VSE (132)
V.22 (15)
Systems Integration (4)
Resource Management (7)
Intel Atom C3000 (5)
Product Compliance (1)
solutions development (2)
File Delivery (1)
storage and networking (1)
Logistics and Trade Compliance (2)
ProGen Plus Interface (4)
ntel Xeon Scalable Processor Family (1)
Intel Xeon Scalable Based Platforms (2)
Skylake (1)
Line Consolidation (5)
Sandy Bridge (4)
SDXC (3)
Dell EMC PowerScale Storage (1)
DIP switches (5)
Help Management (4)
Intel Chiplet Technology (1)
4G (1)
Intel 10nm SuperFin Technology (1)
Storage Appliances (5)
Security (20)
4GL (5)
Dell EMC ProSupport (1)
communications (1)
Output Management (142)
VSE (7)
Web-Enablement (11)
Modem (51)
edge servers (3)
VMware vSAN cluster1 (1)
3270 Terminals (7)
Java, PC, and Web Version Control (3)
VROC (1)
REXX (2)
Cloud (1)
IMS (10)
Intel SmartNICs (1)
UNICOM Government Services (1)
Hub (4)
PIE/TSO Suite (15)
Intel Atom (2)
Data File Management (5)
Transitioning to Haswell (1)
server architecture (1)
GCS (7)
CICS Applications (11)
RSA Conference (10)
Skylake Purley (1)
Ethernet (13)
PIE/CICS Suite (13)
Intel E810 (1)
UNICOM Engineering Flexibility (3)
customs and trade (1)
Policy Management (1)
Loop Detection (3)
PDQ (5)
Global Support (3)
Regulatory Compliance (9)
SDHC (3)
Singlemode (4)
Asset Management (2)
Optane memory (1)
product lifecycle support (1)
HPC (1)
RAID (1)
Dell Technologies OEM Solutions Partner Summit and Awards (1)
Message Console Management (9)
Low Profile PCI (10)
purpose built hardware (1)
z/OS (306)
bronze (1)
Controller (28)
Deployment Partner (2)
UniGW 2.0 (3)
System Performance Monitoring (5)
Global Expansion Partners (1)
Automated Operations (68)
Global Services (1)
Session Management (36)
2nd Generation Intel Xeon Processor Family (1)
Automated Messaging (9)
Content Management (32)
Gateway (11)
UNICOM Engineering Global Scale (3)
Automated Data Compression (5)
ISC West (1)
financing (1)
Port Server (8)
Dell Security (1)
Intel® (12)
Java (10)
Flash ROM (28)
distribution (1)
Accounting (6)
System Integration (5)
Lewisburg PCH (1)
Batch Processing (6)
Power Switch (8)
Dell EMC Unity XT (2)
Speed Leveling (8)
Intel Xeon Scalable Processor Family (5)
Cybersecurity Awareness Month (5)
Dell OEM (1)
Dell EMC PowerStore Storage (1)
Dial-up (69)
Issue Tracking (5)
Support Services (3)
Dell EMC Powerlex (1)
Multi-Mode (5)
Virtual OEM (2)
trade restrictions (1)
Carrier Loss Redial (8)
State and local Government (1)
ALM (32)
certifications (1)
Dell EMC OEM PowerEdge (1)
Atom C3000 (2)
Menu Management (13)
Application Lifecycle Management (43)
Windows (66)
Line Probing (18)
Data Privacy Week (1)
Forward Stocking Locations (1)
5G (6)
Optane (1)
Cyber Security (13)
Intel Partner Forum (1)
Dell EMC Titanium OEM (2)
Production Printing (1)
software (2)
TLM (1)
Hybrid (8)
Embedded (5)
SD (3)
Leasing (1)
Cellular (12)
electronic waste (2)
Fleet Management (1)
Intel Optane DC (3)
Risk Management (2)
Dell Technologies World (5)
servers (3)
Print Management (137)
Brexit (1)
Software Change Management (32)
Aggregation (15)
Web-Based (1)
Dell EMC OEM (2)
virtualization (1)
Online Help (11)
Data security (5)
appliance servers (4)
5G Network (2)
Networking Capability (1)
WebSphere (1)
High Bandwidth Memory (1)
Network Attached Storage (6)
USB (54)
Fault Analysis and Testing (62)
File Processing (8)
Edge computing (11)
Telephony (11)
VTAM (33)
GSM (8)
Imports (1)
Enterprise Content Management (1)
Web Access (7)
Diagnostic (3)
Security Management (8)
IBM i (105)
Zero Trust (1)
UNICOM Engineering Products (4)
TSO (3)
India (1)
UNICOM Engineering Services (1)
Technology (22)
Console Management (19)
Physical Security (1)
V.Everywhere (8)
VM (7)
AIX (6)
Modemulator (6)
Productivity (38)
Golf Classic 2019 (1)
Advance Replacement Support Program (1)
Voice (5)
Dell EMC Isilon (2)
External (23)
Consolidation (2)
Dell EMC PowerVault ME4 (2)
Technology Transitions (10)
Network (1)
Intel Optane (6)
golf classic, humanitarian, charity, philanthropy, engineering, (2)
SSD (1)
Linux (33)
Columbus Suite (140)
Application Development (7)
LANSA (4)
Dell 15G (2)
Advanced Job Scheduling (9)
Technology Trends (7)
Regeneration (2)
data storage (4)
Backup (3)
Cloud Storage (2)
Purley (2)
Solution Design (2)
Extension (4)
database IOPS1 (1)
GPS (8)
Synon (5)
Application Lifecycle (2)
Wireless Mesh (4)
Internal (25)
Omni-Path (3)
Synchronization (1)
Document Processing (125)
GDPR (1)
Compliance Management (1)
30 Pin (5)
Reliability (4)
microarchitecture (1)
Analysis (8)
Intel® Atom® C3000 (2)
Compact Flash (3)
HSPA+ (5)
Tablet (9)
Eclipse (30)
Code Path Analysis (11)
gold (1)
e-recycling (2)
recycle electronics (2)
Reporting (68)
Dell PowerEdge C4140 (1)
Dell 14G (1)
Library Management (10)
Statement of Conformance (1)
VSAM Forward Data Recovery (5)
SCM (32)
JES Administration (10)
Administration (1)
EVDO (5)
TAP (26)
Grown Defects on HDDs (1)
IPMI (1)
video data storage (2)
UNICOM Engineering Customer Portal (1)
Intel Xeon Scalable (3)
Storage Management (8)
Serial (40)
VSAM (27)
memory (1)
OEM (8)
NVMe (1)
Performance Analysis (5)
AI (4)
Tape Management (8)
Dell Technologies OEM & IoT (7)
Micro (5)
Compression (4)
Strategic Partner (1)
ECM (1)
Cost Accounting Standards (1)
services (1)
Lease to own (1)
purpose-built hardware (3)
Business Intelligence (15)
J2EE (2)
trade compliance (2)
Dell Platforms (2)
Global (15)
Global Expansion (1)
IoT (8)
TeamBLUE (5)
CICS (85)
Artificial Intelligence (4)
CDMA (5)
CICS Print (1)
Helpdesk (3)
EU Lot 9 Regulations (4)
Centralized Control (1)
Remote Access (8)
Accessory (5)
Data Center (1)
Intel Partner Connect (3)
UNICOM Engineering (12)
UNIX/Linux (18)
Quality (1)

Tag Cloud

Brand Protection2nd Generation Intel Xeon Processor FamilyNetworking CapabilityLibrary ManagementAccountingtrade rules and regulationsDocument CompositionCompressionDell PowerEdge C4140eReaderDebuggingCybersecurity Awareness Monthe-recyclingcomputingStatement of ConformanceRSA ConferenceTape ManagementVTAMConsolidationTechnology TransitionsSinglemodeSoftmodemDell EMC ProSupportDell EMC Titanium OEMRAIDReliabilityLine SharingAccessoryDell EMCIBM iLinuxStorage ManagementIntel E810trade restrictionsLine ProbingFile SharingPolicy ManagementContent ManagementGDPRpurpose built hardwareIoT ChallengesSDHCUNICOM Engineering ExpertiseBrexittrade complianceCablearchitectureIntel Xeon Scalable Based PlatformsArchivinge-wasteSystems MonitoringProGen Plus InterfaceOnline HelpTransitioning to Haswelldigital transformationStrategic PartnerCybersecuritybronzeUNICOM Engineering ServicesDatabaseSupport ServicesHybrid2021 Dell OEM NA Partner of the YearGSMGlobal ServicesEclipseFleet ManagementGatewayEVDOProduction PrintingWeb-EnablementBusiness IntelligenceserversFirewallAIXcommunicationsLeasingMessage Console Managementserver architectureintegrationAtom C3000WebSphereUNICOM EngineeringLine ConsolidationCompact FlashfinancingProduct ComplianceapplianceCopperReportingPartnersSynonTelephonyCapacity Planning4GLOutput ManagementData BackupVSAMPowerEdgeDisk ManagementDell EMC PowerScale Storageedge serversIntel Xeon ScalableIntel 10nm SuperFin TechnologyDell Technologies OEM & IoTPort ServerFPGACarrier Loss RedialIntel 144-Layer 3D NAND Flash MemoryIPMIMulti-ModeVROCDell SecuritymemoryVirtual OEMApplication Lifecycle ManagementDell Technologies Worldcustoms and tradeEnterprise Content ManagementVoiceDell EMC Unity XTControllerLow Profile PCISDTransparent Supply ChainData securityUNICOM Engineering FlexibilityAdvance Server ReplacementDefectsPerformance AnalysisSession ManagementDIP switchesExpansion CardAdvance Replacement ServicesIntel Partner ConnectSkylakeSkylakeInSync SuiteTabletDell EMC OEMCICS PrintUNIX/LinuxGolf Classic 2019Code EditorIssue TrackingNABHDDs4GProductivityAutomated Job SchedulingArtificial IntelligenceAutomated MessagingOmni-PathmicroarchitectureDell PlatformsJob AccountingJavaAutomated OperationsJES AdministrationTerminal EmulationSystem IntegrationV.22CloudBackupBatch ProcessingIndependent Software VendorsAutonomous DrivingAdvance Replacement Support ProgramDell EMC IsilonTSOntel Xeon Scalable Processor FamilyStandsoftwarerecycle electronicsAIFile DeliveryData File ManagementFederal GovernmentApplication ModernizationSmartphoneIntel Xeon Scalable ProcessorsPCIWeb-BasedIndiaSSDSerialCode Path AnalysisCloud StorageGlobalAutomatedlow-powerIntel Optane SSDsDiagnostic30 Pindata storageIntel®Network Attached StorageDashboardSDXCAdvanced Job SchedulingVOEMDell Technologies OEM Design Solutions ExperienceWireless MeshUNICOM Government ServicesHubIntel Optane DCSpool File ManagementservicesMicroData Privacy WeekModemPublic SectorVMware vSAN cluster1Intel SmartNICsTechnologyResource ManagementEmbeddedInternalState and local GovernmentEthernetDell EMC PowerlexCompliance ManagementSpeed LevelingExternalWindowsWeb AccessCICSSystems ManagementFiberRSA 2018Technology TrendsQualitysolutions developmentRegulatory ComplianceConsole ServerPortfolio ManagementDell EMC OEM PowerEdge 14th Generation ServersHigh Bandwidth MemoryLewisburg PCHDell PowerStoreECMCentralized ControlDell EMC PowerStore StorageUSBSolution DesignColumbus Suitestorage and networkingRegenerationgoldDellData CenterIntel Optanez/VMvideo data storageForward Stocking LocationsUniGW 2.0ALMdatabase IOPS1Dell Technologies OEM Solutions Partner Summit and AwardsCard ReaderConsole ManagementdistributionGigabitAggregationiDRAC with Quick Sync 2 mobile-based managementSoftware Change ManagementGlobal SupportPowerEdge 14G ServersDocument Managementz/VSEApplication DevelopmentLewisburg2019 Partner of the YearGolf ClassicIoTDocument Management and DeliveryPerformance MonitoringPurleyJava, PC, and Web Version ControlIntel Optane Persistent MemoryVMSolarisSecurity ManagementStorage Area Networking (SAN)Dell 14GcertificationsFile ManagementUNICOM Engineering Customer PortalJ2EEIntel Xeon Scalable Processor FamilyCustom-Built ServersVideo SurveillanceVSE56KPhysical SecurityLogistics and Trade ComplianceMenu ManagementApplication LifecyclePCIeVSAM Forward Data RecoveryLoop DetectionRisk ManagementvirtualizationCellularsilverBatch ScheduleIMSCDMADellTechWorldQuickAssistData protectionSCMMexicoHalf DuplexCyber SecurityWindow ManagementEdge computingDell TechnologiesPartnershipMacro-Level InterpreterSecurityLANSASystems IntegrationBusinessIntel AtomHSPA+purpose-built hardwareCloud ComputingData ManagementPower SwitchStorage AppliancesSandy Bridgedeep technologyPDQGlobal Expansion PartnersDatacenter, NetApp, DCOI, Compliance, data center optimizationQATV.Everythingz/OSWCDMADocument ProcessingDell EMC OEM PowerEdgeCost Accounting StandardsAnalysisISC WestProblem and Incident ManagementOptane memoryGPSExpressCardPrint ManagementRemote AccessApplication Deploymentelectronic wastePerformance ManagementHelp DeskFull Duplexappliance servers3270 TerminalsCICS ApplicationsAutomated Data Compression5GFinancial ServicesHelpdeskSkylake PurleyKnowledge baseISO StandardsIntel Atom C3000Help ManagementIntelIntel® Atom® C3000EU Lot 9 RegulationsGovernmentGlobal ExpansionFile ProcessingNASDell 15GGrown Defects on HDDsSynchronizationDial-upIntel Partner ForumEventV.EverywhereContent Transformationgolf classic, humanitarian, charity, philanthropy, engineering,ExtensionUNICOM Engineering ProductsplatinumFault Analysis and TestingTLMCARTS SuiteHPCproduct lifecycle supportWhitepaperOptaneTAPFlash ROMInternet of ThingsIntel Chiplet TechnologyLease to ownelectronic recyclingMacOEMGCS5G NetworkPIE/TSO SuiteCA 2EDell EMC PowerVault ME4Modem EmulationCustom Server BrandingAdministrationNetworkAsset ManagementNVMeTeamBLUEDeployment PartnerDell EMC OEM StorageUNICOM Engineering Global ScaleDell OEMPIE/CICS SuiteUSB 3.0ImportsZero TrustATCAModemulatorREXXSystem Performance Monitoring


Archive