dcsimg

The Best Programming Languages Born in the Last Decade

While there is plenty to like about venerable languages like C and Java, the best programming languages of the last 10 years have a lot to offer. When it comes to the best programming languages, oldies may be goodies, but more modern programming languages are sometimes the most suitable tool for the job. True, some of today’s most popular programming languages, such as C (first released in 1972) … [Read more...]

How to Overcome Barriers that Lead to AI Failure

At this week’s AI Summit, AI leaders from IBM and Google examined the factors that contribute to AI failure and shared best practices for getting past those obstacles.Business leaders see tremendous competitive advantage in artificial intelligence, due to the promise it holds to greatly improve customer satisfaction, retention and loyalty; increase revenues; and save money. Yet, only five percent … [Read more...]

Top Trends & Challenges: Shifting to the Cloud

Moving to the cloud can actually create as many challenges as it solves. This is especially true if a company’s goals for the cloud aren’t in keeping with what the cloud can accomplish. The cloud can do many things, but it isn’t magic. And expecting magic is a sure fire way to be disappointed. Here are some ways in which leaning towards the cloud tech can create some challenges for … [Read more...]

Security round up

With so much cyber security news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Security round-up of the three top cyber security stories. U.S Army The United States Marine Corps is a branch of the United States Armed Forces, responsible for conducting expeditionary operations with the United States Navy, the Army and/or the Air … [Read more...]

How to Build Password Policies for Your Customers

  Building your customer password policy can be tricky because it needs to balance security and convenience. Too much convenience, and you lose security. Too strict, and no one will use it.  As a managed service provider (MSP), how do you create password policies that work for everyone? First, let’s look at some key elements that go into creating a comprehensive policy. Read more … [Read more...]

Curiosity-Driven Data Science

Data science can enable wholly new and innovative capabilities that can completely differentiate a company. But those innovative capabilities aren’t so much designed or envisioned as they are discovered and revealed through curiosity-driven tinkering by the data scientists. So, before you jump on the data science bandwagon, think less about how data science will support and execute your plans and … [Read more...]

4 Steps to Using Email Security to Help Increase Revenue

Most companies want to generate revenue and be successful without unnecessary interruptions in productivity and continuity from their systems. To achieve this, they need a range of IT management tools to assist them. This includes having a security strategy and tools in place to help prevent cyberattacks—and email security is a vital part of this. Here are four steps to adding email security to … [Read more...]

Remote Access—Ensuring Best Practices at Every Turn

If you’re looking for a remote access tool, it’s a buyers’ market; they come in all shapes, sizes, scopes, and price points. Interestingly, in addition to a premium marketplace—which in itself offers an enormous range of choice—there’s also a compelling freeware catalogue of tools out there, some more functional than others. Rather than just picking one to get the job done, you need to be very … [Read more...]

What Are Permissioned Blockchains, and How Can They Help IT Pros?

What’s a permissioned blockchain? If you develop blockchain applications, or work for a company that is interested in learning how blockchain technology can improve its operations, that is an increasingly important question to ask.It is also, however, a question that many IT professionals are unlikely to think to ask. Permissioned blockchains--which provide privacy and security protections that … [Read more...]

Securing Your Remote Access—Are You Managing Logins Effectively?

Your remote access tool—whatever it may be—is a gateway to your customers’ resources: their machines, their IP, and, ultimately, their data. What steps do you take to ensure your remote access tool is working to maintain the integrity and trust you’ve worked so hard to earn? Let’s talk a bit about layered security and look at some of the key areas you need to consider when it comes to ensuring the … [Read more...]