[ad_1] In recent weeks, two tech giants have started large-scale redundancy exercises. Twitter notified 50% of its staff of layoffs by email in what has been described by some as a digital P&O dismissal, and Meta announced cuts of 13% of its workforce. With recession now a reality, this …
Read More »How to get structure from unstructured data
[ad_1] We are in the midst of an unstructured data revolution – with 80% of data likely to be unstructured by 2025, according to IDC. The rise of advanced analytics and in particular artificial intelligence/machine learning (AI/ML) has allowed intelligence to be gained from the vast reservoir of previously …
Read More »Microsoft: Hackers are using this ‘concerning’ tactic to dodge multi-factor authentication
[ad_1] Microsoft has outlined several mitigations to protect against attacks on multi-factor authentication that will unfortunately make life more difficult for your remote workers. Three years ago, attacks on multi-factor authentication (MFA) were so rare that Microsoft didn’t have decent statistics on them, largely because few organisations had enabled MFA. …
Read More »Is Elon Musk’s Twitter safe, and should you stop using it?
[ad_1] The arrival of Elon Musk at Twitter headquarters on 26 October 2022, bearing a no-doubt hastily acquired basin to deploy in the service of what can only be described as a dad joke, has prompted seismic changes in the world of social media. Twitter, one of the longest-established …
Read More »Untangling messy collaborations, contributing costs and complexity
[ad_1] As businesses increasingly rely on their digital infrastructure, downtime has a proportionally greater impact. However, while attention to reducing outages in the datacentre appears to be paying off, the costs per outage are not falling. Andy Lawrence, executive director of research at Uptime, says a trend for “small …
Read More »New gold standard to protect good faith hackers
[ad_1] Bug bounty programme operator and ethical hacking platform HackerOne has launched a Gold Standard Safe Harbour (GSSH) statement for its customers to help them demonstrate that they can and will protect ethical hackers from liability when hacking in good faith. Any vulnerability disclosure policy or operational bug bounty …
Read More »Post Office scandal inquiry’s expert IT witness ‘troubled’ by his findings
[ad_1] The Post Office IT scandal inquiry’s appointed expert IT witness was “troubled” by the lack of integrity of data from the Horizon system that was used to send people to prison. During his investigations, Charles Cipione said he was also “disturbed” by some of the development team’s practices. …
Read More »South Korea cancels 5G 28GHz spectrum allocation to telcos due to ‘lack of spending’
[ad_1] moom The South Korean government said on Friday that it will cancel the spectrum that was allocated to local telcos for their 5G deployment, citing their lack of investment in the sector. The unprecedented move will see KT and LG Uplus lose their right to use the 28GHz spectrum …
Read More »Singapore state investment firm to write down $275M in FTX
[ad_1] Temasek Holdings has announced plans to write down its investment in troubled cryptocurrency exchange FTX, saying its belief in disgraced founder Sam Bankman-Fried was “misplaced”. The Singapore state-owned investment firm had participated in two funding rounds, totalling $275 million in investment. It invested $210 million for a minority stake …
Read More »Pioneer behind IT systems design dies
[ad_1] LEO pioneer Peter Hermon, who oversaw the technology integration of airlines BEA and BOAC to form BA in the 1970s, has died, aged 93. Hermon’s career in IT began when he joined J Lyons & Co in 1954. There, he cut his computer teeth as one of a …
Read More »