January, 2023

article thumbnail

3 Key Cloud Computing Trends to Consider When Planning Your IT Budget

Information Week

As remote and hybrid work rises in popularity, so will the adoption of technologies that prioritize agile, secure end-user computing.

Budget 196
article thumbnail

14 Inspiring Resolutions for Digital Trailblazers, CIOs, and CDOs on Digital Transformation

Social, Agile and Transformation

New year’s resolutions help you reflect on the past and think about some objectives and changes you want for the upcoming year. I think they are useful tools for self-reflection, even if many of us forget about them once the pressures of the new year take over our days and cloud our longer-term thinking. This year is a little hard to figure.

Tools 327
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How hackers stole the personal data of 37 million T-Mobile customers

Tech Republic Security

The criminals took advantage of an API to grab personal details such as customer names, billing addresses, email addresses, phone numbers, dates of birth, and T-Mobile account numbers. The post How hackers stole the personal data of 37 million T-Mobile customers appeared first on TechRepublic.

Mobile 212
article thumbnail

Microsoft makes multi-billion dollar investment in ChatGPT-owner OpenAI

Tech Republic Cloud

This round of investment will help OpenAI’s research in AI and seek to position Azure OpenAI services for new AI-powered experiences. The post Microsoft makes multi-billion dollar investment in ChatGPT-owner OpenAI appeared first on TechRepublic.

Microsoft 176
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Pet fish commits credit card fraud on owner using a Nintendo Switch

TechSpot

The entire heist started as an experiment to see if fish could complete Pokémon Scarlet and Violet unassisted. To do it, Japanese YouTuber "Mutekimaru Channel" set up a webcam focused on his fish bowl. Motion-tracking software monitored the fish as they swam across an overlaid grid populated with controller inputs.

Software 145
article thumbnail

The 7 new rules of IT leadership

CIO Business Intelligence

The CIO role continues to evolve, changing as dramatically as the technology it manages and maintains. Moreover, the pace of the chief IT position’s transformation seems to be accelerating — likewise mirroring the speed of change in the tech stack. Consequently, tech executives must lead, manage, and work differently than they did in the past. How so?

Meeting 145

More Trending

article thumbnail

Ex-Twitter VP Mike Davidson joins Microsoft to lead Web Experiences design and research

GeekWire

Mike Davidson and his cats Henry and Bode. (Photo courtesy of Mike Davidson). Mike Davidson , a Seattle technology veteran and longtime designer, is joining Microsoft as the corporate vice president of design and research. Davidson will head up design for the Web Experiences organization, which is in charge of MSN, Bing, the Edge Browser, and more. He succeeds Albert Shum , who left Microsoft in October after 15 years.

Research 145
article thumbnail

Machine-Learning Python package compromised in supply chain attack

Tech Republic Security

A nightly build version of a machine-learning framework dependency has been compromised. The package ran malicious code on affected systems and stole data from unsuspecting users. The post Machine-Learning Python package compromised in supply chain attack appeared first on TechRepublic.

System 206
article thumbnail

How to synchronize two Microsoft SharePoint lists using one Microsoft Power Automate flow

Tech Republic

Especially when SharePoint lists need to be kept separate for security reasons, this Power Automate flow tutorial will help you keep both lists up-to-date. The post How to synchronize two Microsoft SharePoint lists using one Microsoft Power Automate flow appeared first on TechRepublic.

Microsoft 142
article thumbnail

Gravity batteries in abandoned mines could power the whole planet, scientists say

TechSpot

A study from the International Institute for Applied Systems Analysis (IIASA) proposes that decommissioned mines could be repurposed to operate gravity batteries. Converting old mines could provide enough energy to match the entire planet's current daily electricity consumption.

Energy 145
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

Top automation pitfalls and how to avoid them

CIO Business Intelligence

First Tech Credit Union is a San Jose-based financial institution with more than $16 billion in assets. As the eighth largest in the country, it primarily serves tech companies and their employees, but still has a lot of manual processes in place. “We’re very early in our automation journey,” says Mike Upton, the organization’s digital and technology officer.

How To 145
article thumbnail

Managing Remote Workforces: IT Leaders Look to Expanded Suite of Tools

Information Week

Many organizations are still grappling with the shift to remote workforces, and to develop a successful management policy, multiple stakeholders -- and technologies -- come into play.

Tools 191
article thumbnail

Meta and Microsoft are ditching office space in the Seattle area

GeekWire

On the rooftop at Arbor Blocks 333 in Seattle, where Meta is subleasing space. (GeekWire File Photo / Monica Nickelsburg). Meta and Microsoft are both giving up office space in the Seattle region amid the shift to hybrid work and broader tech downturn. Facebook parent Meta is subleasing its 6-story space at the Arbor Blocks 333 building near downtown Seattle, as well as Block 6 , a 325,000 square-foot space at the Spring District complex in Bellevue, Wash., east of Seattle. “The past few y

article thumbnail

As a cybersecurity blade, ChatGPT can cut both ways

Tech Republic Security

The cybersecurity implications of ChatGPT are vast, especially for email exploits, but putting up guardrails, flagging elements of phishing emails that it doesn’t touch and using it to train itself could help boost defense. The post As a cybersecurity blade, ChatGPT can cut both ways appeared first on TechRepublic.

Training 201
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

How to easily deploy a full-stack application in Portainer with templates

Tech Republic

Deploying a complex Docker stack isn't nearly as challenging as you think, at least when Portainer is your GUI of choice. Find out how easy this is with Portainer templates. The post How to easily deploy a full-stack application in Portainer with templates appeared first on TechRepublic.

article thumbnail

This $200 VR muzzle lets you strap a second bulky device to your head

TechSpot

Virtual reality accessory startup Shiftfall unveiled a unique microphone that users can wear. Dubbed "Mutalk," the mic looks similar to a VR headset but for your mouth. Playing VR games already looks silly enough to those watching. Adding this crazy device takes it to another level of weirdness entirely.

article thumbnail

Top 9 challenges IT leaders will face in 2023

CIO Business Intelligence

Three years ago, IT leaders were squarely focused on how to adopt fledgling AI techniques and approaches into their business models in service of digital transformations that included plans for shifting some workloads to the cloud. But then the pandemic hit, requiring a historic pivot that set some best-laid plans aside and accelerated others. Now that organizations have returned to a new (somewhat) normal, CIOs appear to be focused on getting back to basics — and untangling tech debt incurred i

article thumbnail

The In-Office Meeting Room Gets an Upgrade

Information Week

As distributed workforces grow and hybrid office arrangements evolve, in-office meeting spaces must keep pace with technological advancements and shifting patterns in how they're used.

Meeting 187
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Ring Car Cam extends Amazon’s security footprint further beyond the home

GeekWire

Ring’s Car Cam was announced and made available for pre-order today. (Ring Photo). Ring, the Amazon company best known for its video doorbell, is making the leap to the vehicle dashboard. The company’s new Car Cam , unveiled Thursday morning, is designed to record video while driving or parked using a dual-facing camera that captures events both inside and outside the vehicle.

Security 143
article thumbnail

FBI takes down Hive ransomware group

Tech Republic Security

Working with international law enforcement, the FBI said it has seized control of the servers the Hive group uses to communicate with members. The post FBI takes down Hive ransomware group appeared first on TechRepublic.

Groups 200
article thumbnail

How to create and manage Kubernetes Secrets in Portainer

Tech Republic

Instead of keeping Secrets in Kubernetes manifests, store them separately. Portainer makes this quite simple; I'll show you how in this tutorial. The post How to create and manage Kubernetes Secrets in Portainer appeared first on TechRepublic.

How To 130
article thumbnail

The US Department of the Interior has a significant password issue

TechSpot

The Office of Inspector General oversighting one of the most important federal agencies in the US Government analyzed internal practices for password management and complexity. The result is startling, to say the least: the US Department of the Interior is doing almost everything wrong, exposing the Government body to grave.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

2 Innovations That Can Tip the Balance in Cybersecurity

CIO Business Intelligence

By John Davis, Retired U.S. Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks What critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? This is not just a theoretical exercise.

Network 144
article thumbnail

Tech Company Layoffs: The COVID Tech Bubble Bursts

Information Week

As COVID drove everyone online, tech companies hired like crazy. Call it the COVID Tech Bubble. Now we are hitting the COVID tech bust as tech giants shed jobs by the thousands.

Company 185
article thumbnail

Putting the AI in domains: Why the new era of artificial intelligence inspires this startup founder

GeekWire

Startup founder and engineer Kirill Zubovsky used OpenAI’s GPT-3 to create a business and domain name generator. (Photo courtesy Kirill Zubovsky.) After calling up the website Smartynames.com this week, I typed in a description for a business idea: “ Drone photography business in the greater Seattle area. “ Like lots of people, I’ve been through the agonizing process of brainstorming business and project names, and trying to find appropriate — and available — web domains

article thumbnail

Recent 2022 cyberattacks presage a rocky 2023

Tech Republic Security

A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce under duress, a step behind and understaffed with some 3.4 million vacant seats. The post Recent 2022 cyberattacks presage a rocky 2023 appeared first on TechRepublic.

Security 197
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to add a new development environment to Portainer

Tech Republic

If you've deployed Portainer as a Kubernetes development platform and want to add a different environment, you're in luck — the process is quite simple. The post How to add a new development environment to Portainer appeared first on TechRepublic.

article thumbnail

"Robot lawyer" to present arguments in world's first AI-defended legal trial in February

TechSpot

Several years ago, we covered how a machine-learning algorithm bested 20 human lawyers when analyzing risks in nondisclosure agreements. The AI tied the highest-scoring lawyer with 94 percent accuracy. At the time, we predicted that it probably wouldn't go much further than that.

145
145
article thumbnail

7 tell-tale signs of fake DevOps

CIO Business Intelligence

There’s no doubt that DevOps has helped many IT organizations achieve their goal of delivering applications and services faster and better than traditional software development processes. Unfortunately, while some IT leaders do a fine job of trumpeting DevOps’ benefits, their teams are headed in the wrong direction , embracing half-baked or completely wrong tools and practices.

Devops 145
article thumbnail

Moving to the Cloud? Invest in Your People With These Steps

Information Week

Companies focused on digital transformation can side-step the cloud skills shortage by looking within their company to develop existing staff.

Cloud 209
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.