Otis takes the smart elevator to new heights

Otis takes the smart elevator to new heights

No one likes to get stuck in an elevator. Otis One, a connected solution from Otis Elevator, aims to help ensure that doesn’t happen by making the Farmington, Conn.-based company’s elevators smarter. The solution, which incorporates IoT sensors, big data, AI, and a cloud-native application, is embedded in Otis’ Gen3 and Gen360  elevators, delivering customers and technicians real-time visibility of an elevator’s health, as well as data insights for predictive maintenance and options for remote…

Read More

IT services company Atos plans IBM-style split

IT services company Atos plans IBM-style split

French multinational IT services company Atos is planning to split in two, much as IBM spun out its legacy-focused managed infrastructure services business to form Kyndryl in November 2021. It’s a Hail Mary move for Atos. CEO Rodolphe Belmer, who was brought in on Jan. 1, 2022, to lead the company through the latest in a series of transformations, has nominated two deputy CEOs to lead the two new businesses, and has resigned, effective by…

Read More

Data archiving: It doesn’t have to be on tape

Data archiving: It doesn’t have to be on tape

Long-term storage—archiving—requires a very different approach than backup and recovery where throughput and deduplication are the main concerns. Archiving calls for storing data for long periods without becoming corrupted, so when it is retrieved, it is exactly what got stored 10 or 20 years ago. For most organizations that reach a certain size, standardized linear tape open (LTO) magnetic tape is the best choice. But for those that cannot justify the cost or believe tape…

Read More

Reexamining the “5 Laws of Cybersecurity” | The State of Security

Reexamining the “5 Laws of Cybersecurity” | The State of Security

Nearly a year ago, journalist Martin Banks codified “Five Laws of Cybersecurity”. Cybersecurity is a complicated field, and any way to simplify its many facets into short, easy-to-remember maxims is always welcome. The five laws are a very good start towards developing a robust security program. The laws are: Treat everything like it’s vulnerable. Assume people won’t follow the rules. If you don’t need something, get rid of it. Document everything and audit regularly. Plan…

Read More

Cyberthreat Defense Report (CDR) 2022: Key Points You Should Know

Cyberthreat Defense Report (CDR) 2022: Key Points You Should Know

Each year, CyberEdge publishes the Cyberthreat Defense Report (CDR). Aimed at IT security leaders, this comprehensive report outlines the threats, security issues, and industry concerns that are most pressing. Information summarized in the CDR is gathered through surveys conducted in 17 countries and 19 industries. Respondents are IT decision-makers in organizations with at least 500 employees. The diversity of locations and industries provides a broad and multi-faceted insight into cybersecurity across the globe. By understanding…

Read More

Responding To High-Level Cyberattacks on A Mid-Level Budget

Responding To High-Level Cyberattacks on A Mid-Level Budget

By Jesper Zerlang, CEO, LogPoint Protecting your business against threat actors is no small task. Not only has the number of cyberattacks increased dramatically during the last year, but attacks are also becoming increasingly complex. Organizations’ attack surface is expanding due to the quick advancement of digital transformation. The COVID-19 pandemic has significantly increased remote work, and businesses are using a growing number of SaaS solutions and applications, conducting more and more business online. Simultaneously,…

Read More

Transparency And Collaboration Between Vendors and Customers Are Key to Reducing Third-Party Security Incidents

Transparency And Collaboration Between Vendors and Customers Are Key to Reducing Third-Party Security Incidents

By Nick Sorensen, CEO of Whistic, Inc. It’s no secret the number of third-party security incidents continues to rise annually. Last year started with the SolarWinds breach, ended with Log4j, and virtually every day in between was marked with news of one breach or another. Recent research by Whistic found that nearly half of all businesses surveyed experienced a data breach in the last three years with more than 80% of those being caused by…

Read More

How to find the best resume writing service for you

How to find the best resume writing service for you

Whenever I start (gently) haranguing my CIO friends about the lackluster state of their LinkedIn profiles or steer the conversation toward the touchy topic of “personal branding,” the litany of excuses roll out like thunder. “I’m not looking for another job, I love the one I have!” “I don’t have time to pay attention to that stuff.” “I’m really not into self-promotion.” This quaint excess of modesty about your career accomplishments might seem like an…

Read More

Defend Your Castle with Zero Trust

Defend Your Castle with Zero Trust

Protecting yourself, your company and your data from the vulnerabilities of connectivity is no longer an option, but an imperative. By Peter Oggel, Chief Technology Officer, Irdeto In medieval times, rulers would dig a deep moat around their castle walls. At night, the drawbridge would be raised, and anyone inside the castle walls would be protected effectively from intruders. Perimeter security on your company’s systems and connected devices is a bit like those moats. It’s…

Read More

How CIOs Can Democratize Automation

How CIOs Can Democratize Automation

CIOs continue to place a high priority on digital transformation projects – the latest research from the State of the CIO 2022 survey suggests that leading digital business and transformation initiatives are among the top three priorities for CIOs. At the same time, enabling remote capabilities has increased in importance. These operational and transformation projects place more work in the hands of the IT department, which is still dealing with a labor shortage in the…

Read More
1 2,949 2,950 2,951 2,952 2,953 4,118