December, 2020

article thumbnail

It’s Time To Put Security And Privacy Front And Center For Virtual Care

Forrester IT

(Written with Benjamin Corey, senior research associate at Forrester) Telehealth (virtual care) usage has skyrocketed during the pandemic. When you roll back the tape a few months, healthcare providers were able to (very quickly) stand up virtual care capabilities without having to go through the intensive HIPAA compliance protocols required in the healthcare industry.

article thumbnail

ConfigMgr ebooks | Intune | Windows 10 | Download | SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Let’s read and learn for this holiday season. The following table gives you the option to download ConfigMgr eBooks and some Intune eBooks for free. Hope these help to have a better understanding of Windows 10, Intune, and SCCM. Apart from all these eBooks, you can start learning new technologies using Microsoft Learn TV.

eBook 218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Amazon to offer free cloud-computing skills training

Tech Republic Cloud

At Friday's re:Invent 2020 conference event, the e-commerce giant revealed that by 2025 it will invest "hundreds of millions" to help 29 million people worldwide to develop tech skills.

Training 218
article thumbnail

SolarWinds attack explained: And why it was so hard to detect

Network World

A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack.

article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

Machine learning: A cheat sheet

Tech Republic Security

From Apple to Google to Toyota, companies across the world are pouring resources into developing AI systems with machine learning. This comprehensive guide explains what machine learning really means.

Apple 217
article thumbnail

How Data, Analytics & AI Shaped 2020, and Will Impact 2021

Information Week

Artificial intelligence and automation were key tools in the IT enterprises' pandemic war effort in 2020. Here's how they will continue to change the game in every organization in 2021.

More Trending

article thumbnail

Top 10 ConfigMgr Intune Videos of 2020

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Let’s find out the top 10 ConfigMgr Intune Videos of 2020 on the basis of popularity & total views. Thank you much for the support during the special year 2020. And all the very best for 2021! Don’t forget to subscribe and share if you like some of these videos.

Video 218
article thumbnail

What is Microsoft doing with Linux? Everything you need to know about its plans for open source

Tech Republic Cloud

Microsoft is following the customers and the ecosystem, but pragmatic investment in Linux doesn't diminish the company's commitment to Windows.

Linux 217
article thumbnail

Boston Dynamics robots take over the dance floor in latest video

The Verge

Boston Dynamics’ Atlas and Spot robots can do a lot of things: sprinting , gymnastic routines , parkour , backflips , open doors to let in an army of their friends, wash dishes , and (poorly) get actual jobs. But the company’s latest video adds another impressive trick to our future robotic overlords’ repertoire: busting sick dance moves. The video sees Boston Dynamics entire lineup of robots — the humanoid Atlas, the dog-shaped Spot, and the box-juggling Handle — all come together in a bopping,

Video 145
article thumbnail

Phone scammers were able to get 270% more personal information in 2020 than in 2019

Tech Republic Security

The COVID-19 crisis enabled scammers to take advantage of the guileless, as bad actors were able to extract personal information from targets, according to a new report from First Orion.

Report 217
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

10 Hot IT Job Skills for 2021

Information Week

For the first time in decades, some IT titles are experiencing a salary decline -- unless you have these high-demand skills.

215
215
article thumbnail

How hacked is hacked? Here’s a ‘hack scale’ to better understand the SolarWinds cyberattacks

GeekWire

(BigStock Photo). “Microsoft, FireEye, and the U.S. Treasury department have been hacked in the SolarWinds attacks.”. This statement is true but doesn’t tell the whole story accurately. It’s true because by most people’s understanding, these organizations have been hacked. But it doesn’t tell the whole story accurately because each of these organizations has had different impacts with different levels of severity from “the hack.” A good example of why this matters is how we talk abou

Network 145
article thumbnail

Deploy Microsoft Store Apps using ConfigMgr | SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Let’s try to understand How to deploy Microsoft Store Apps Using ConfigMgr. Microsoft Store for Business gives opportunity organizations to automatically sync Microsoft store apps and make them available for ConfigMgr admins. Once the Microsoft store for business application is synced with Configuration Manager, you can create a Microsoft Store application in the admin console […].

Microsoft 218
article thumbnail

High Performance Computing in the cloud: Why there's hope

Tech Republic Cloud

Commentary: The HPC market has struggled to modernize with cloud, but startups like Rescale may be able to change this.

Cloud 218
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

DeepMind’s big losses, and the questions around running an AI lab

Venture Beast

GUEST: Last week, on the heels of DeepMind’s breakthrough in using AI to predict protein-folding came the news that the UK-based AI company is still costing its parent company Alphabet Inc hundreds of millions of dollars in losses each year. A tech company losing money is nothing new. The tech industry is replete with examples of companies who burn… Read More.

Examples 145
article thumbnail

Top 5 tech skills to master in 2021

Tech Republic Security

If you want to improve or expand your current skill set, there are a few options you can focus on. Tom Merritt lists five tech skills to master in the coming year.

217
217
article thumbnail

Tesla’s new Boombox feature will let car owners fart at unsuspecting neighbors

The Verge

Illustration by Alex Castro / The Verge. Tesla’s new holiday update will finally give people the ability to use a new Boombox mode, which can broadcast custom audio on the outside of the car (hence the name). As is common with new Tesla features, Boombox combines real utility with lowbrow humor: owners can use fart and goat sounds in lieu of normal, boring honking sounds car horns usually make.

Video 145
article thumbnail

LinkedIn migration data shows that techies aren’t leaving Seattle despite ‘exodus’ in Silicon Valley

GeekWire

Amazon’s Spheres, with the Amazon Day 1 tower and Seattle’s iconic Space Needle in the background. (GeekWire Photo / Kurt Schlosser). Techies are apparently leaving Silicon Valley. The pandemic has sparked what some describe as an “exodus” of tech companies, employees, and investors who are relocating to Austin, Miami, Reno, Madison, and other metros for a myriad of reasons.

Data 145
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

SCCM OSD SMSTS Log File Reading Tips | ConfigMgr | MEMCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In this post, you will learn about SCCM OSD SMSTS Log File Reading Tips with the built-in log reader tool CMTrace. The SMSTS.log is one of the important log files which will help you to troubleshoot installation issues related to Operating System Deployment (OSD) and fix those.

article thumbnail

IBM creates knowledgeable NLP system and adds AI governance capabilities to Watson

Tech Republic Cloud

The goal is to help build trust and transparency in business outcomes, the company said.

IBM 216
article thumbnail

The Butt Pajamas Will Follow You Forever

Gizmodo

If you’re reading this, you might have read the juicy piece that Elle dropped this weekend chronicling how a former Bloomberg reporter torched her entire career after falling for the longtime subject of her reporting— professional-tool -turned-convicted-securities-fraudster Martin Shkreli. And if you know about that… Read more.

Report 145
article thumbnail

Why AI and security pros need to work together to fight cybercrime

Tech Republic Security

Cybercriminals sometimes use AI to their benefit. In order to defeat these cyber bad guys, security pros and AI should focus on what they do best.

Security 216
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Today I learned that the iOS calculator has a scientific mode

The Verge

Today I learned that the iPhone’s built-in calculator app has a scientific mode — and all you have to do to access it is turn your phone on its side. If you’re the type of person who keeps your phone permanently in portrait lock (like me), this might come as a surprise to you, as it did to many of us here at The Verge. that glimpse of an alternate universe vibe when you turn your iPhone sideways and all of a sudden it’s a scientific calculator pic.twitter.com/PNxLVpXRAS — J.R.

145
145
article thumbnail

Ahoy, Jacklyn! Jeff Bezos names Blue Origin’s rocket recovery ship after his mom

GeekWire

Amazon CEO Jeff Bezos and his mother, Jacklyn Bezos, stand behind a model of Blue Origin’s recovery ship with a scale-model rocket on its deck — and the actual ship in the background. (Jeff Bezos via Instagram). SpaceX CEO Elon Musk named his rocket recovery vessels after science-fiction spaceships, but Amazon CEO Jeff Bezos stayed closer to home for the christening of the ship that his Blue Origin space venture will use for at-sea rocket landings.

Banking 145
article thumbnail

ConfigMgr SQL Query Windows 10 Version Count | Dashboard | SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Let’s see how to find out ConfigMgr SQL Query Windows 10 Version Count | Dashboard | SCCM. The different versions of Windows 10 using SQL query. Total number of Windows 10 versions dashboard from SQL query. Since now most of the environment is either moved or moving towards windows 10 so it is important to […].

Windows 218
article thumbnail

The ugly side of Nvidia: A rollercoaster ride that shows when Big Tech doesn't get it

TechSpot

As a corporation, it's Nvidia's prerogative to decide on the reviewers it chooses to collaborate with. However, this and other related incidents raise serious questions around journalistic independence and what they are expecting of reviewers when they are sent products for an unbiased opinion. As an independent tech publication, we've.

145
145
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Canadian Gold Miner Finds 57,000-Year-Old Wolf Pup Still Covered in Fur

Gizmodo

Her life was short. Scientists estimate she lived for about six or seven weeks in the underground den, before it collapsed around her. This tragedy and the permafrost that preserved her body are the reasons we know of this wolf pup’s existence approximately 57,000 years later. Zhùr, or ‘wolf’ in the Hän language, is… Read more.

145
145
article thumbnail

How companies can use automation to secure cloud data

Tech Republic Security

Data automation allows companies to conduct operations more consistently, securely, and reliably. Learn how one company tackled the challenges.

Company 217
article thumbnail

Samsung’s deleting ads that mocked Apple for not including a charger in the box

The Verge

Photo: Samsung (via 9to5Google). Samsung has been caught deleting an ad that makes fun of Apple for not including a charging brick with the iPhone 12 — the same thing it’s rumored to be doing with its Galaxy S21 phones. The Facebook post was made by Samsung Caribbean back in October, and it had a picture of a charging brick with the caption “Included with your Galaxy” ( via 9to5Google ).

Apple 145
article thumbnail

How the SolarWinds hackers are targeting cloud services in unprecedented cyberattack

GeekWire

GeekWire Illustration / Canva Image. [Editor’s Note: Independent security consultant Christopher Budd worked previously in Microsoft’s Security Response Center for 10 years.]. Analysis: To understand where the SolarWinds attackers are going next, and how to defend against them, look to the clouds. The SolarWinds supply chain attacks are unprecedented in many ways.

Cloud 145
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.