You know and love our Must-Read IT Blogs lists, but now, say hello to the nonprofit side.
When teams roll out tablets to replace their physical playbooks, they place a high priority on protecting both the devices themselves and the data inside them.
“Since I pay the bills for those things, breakage was definitely a concern,” says Russ Trainor, vice president of IT for the team. “When you go walking through the locker room, the iPads are on the floor, in the locker, under bags, under shoes. So we needed a good, sturdy cover for them.”
1. Flexibility: Hyperconvergence lets organizations meet current and future needs without having to replace existing infrastructure components. Adopters can easily take advantage of new features provided in software updates.
2. Commodity resources: Hyperconverged systems use low-cost commodity hardware components that are relatively inexpensive, fast and easy to replace when they fail.
3. Centralized virtualization and management: All components are combined in a single shared resource pool with hypervisor technology. Systems management and virtualization are pre-installed, and many systems are optimized for specific workloads.
4. Improved agility: IT infrastructure is greatly simplified, allowing data centers to meet a variety of needs powerfully and responsively.
Mossack Fonseca, the Panamanian law firm at the heart of the “Panama Papers” leak that has rocked the world of international politics and business this week, apparently had very weak security measure in place to protect is websites and data.
News organizations have been publishing stories this week about the law firm helped set up shell corporations and offshore tax havens for the world’s political and financial elite, but the stories all stem from a trove of 11.5 million documents — 2.6 terabytes of data — that was taken from the firm's files.
Microsoft revealed at its Build developer conference on Wednesday that eight months after it launched Windows 10 that the platform is being “actively used on more than 270 million devices.” That figure is up from the milestone of 200 million devices Microsoft reported at the start of 2016.
While that’s an enviable pace, Microsoft has loft goals. In April 2015, the company said it aimed to have 1 billion devices running Windows 10 by the summer of 2018, ZDNet notes.
One of Microsoft's biggest announcements at its annual developer-focused Build conference on Wednesday was the practical applications for Conversations as a Platform.
During the conference's opening keynote, Microsoft CEO Satya Nadella said Conversations as a Platform could revolutionize business productivity and give transactions a personal flavor. By combining voice and image recognition technologies with artificial intelligence APIs, Microsoft's engineers have created applications Nadella referred to as "chatbots" that can assist users in anything from an everyday business transaction to helping the blind visualize the world around them.
Provide inspiration: Business leaders need to be active collaborators, receptive to hearing new ideas as well as working with teams on promising new concepts. Leaders should make it a habit to use collaboration tools, such as web conferencing and social media, when interacting with coworkers.
Foster creativity: Leaders should have the courage to shift from a command-and-control management philosophy to an approach that is more collaborative. When a co-worker’s promising idea becomes reality, organizations should reward creative thinkers with recognition, bonuses and promotions.
Help workers “collide”: Great ideas are often born when coworkers literally bump into each other. This doesn't happen much when they hide inside their cubicles. A powerful wireless network and the freedom of a bring-your-own-device policy can allow the mobility that fosters this movement.
Google is hoping that machine learning technology will help it compete in the cloud services market and win business from large enterprises. Machine learning — the idea that an artificial intelligence can learn from and make predictions based upon data it accesses — is “what’s next” in technology, Eric Schmidt, chairman of Google parent Alphabet, said last week when Google announced its plans, according to TechCrunch.
For a growing number of organizations, the road to BYOD begins with a virtual desktop infrastructure (VDI).
VDI, which runs the user desktop inside a virtual machine residing on a data center server, enables fully personalized desktops for each user while providing the security and simplicity of centralized management. In recent years, VDI has emerged as a quick and effective way of enabling BYOD without exposing an organization to unnecessary risk. With VDI, existing enterprise applications can run without modification, giving users easy, trouble-free access from their personal mobile devices.
Experts recommend a series of steps to keep security risks contained under a bring-your-own-device program:
Carry out a full audit of the organization’s IT environment to determine if the infrastructure is prepared to handle workforce mobility, particularly in terms of security and network demand.
Evaluate specific device use scenarios and investigate the leading practices to mitigate each risk scenario.
Set a security baseline and then certify relevant mobile hardware and operating system types for enterprise use.
Implement acceptable use policies and procedures that clearly communicate boundaries and describe what will happen if they are violated.
Enforce standard security policies, such whole-device encryption, passcode access and failed login attempt limits.