April 22, 2021

Network Tech

Why your company needs a chief data officer

Organizations are recognizing the importance of having an executive who provides oversight responsibility and accountability for their data assets, according to West Monroe expert.

Image: iStockphoto

There’s no denying the importance of data as an organizational asset, and an ongoing study from digital consultancy West Monroe is making the case for hiring chief digital officers.

By 2025, it is estimated there will be 175 zettabytes in the global datasphere. As organizations are finding, there is a lot of value in the data they generate; the trick is being able to manage to monetize it.

SEE: IT job and salary guide: Highest tech salaries, top-paying cities, and compensation-boosting tips (TechRepublic Premium)

The proof is in the pudding, said Doug Laney, innovation fellow at West Monroe. Organizations with chief data officers are 7x more likely to generate external monetary value from their data than those without one, he said. Further, they are

Read more

Future developers and data scientists, check out these courses on Python, JavaScript, Apache Spark and more

The 13 coding courses in this online training bundle also cover C++, HTML, Java, C#, Ruby on Rails, jQuery and the R programming language.

Getty Images/iStockphoto – mirsad sarajlic

2020 was the year of learning how to make whipped coffee and sourdough bread–this should be the year of learning how to code. Not only does being well-versed in programming languages allow you to create all sorts of innovative digital products, but it will also make you more marketable in the developer job market. 

For beginners, figuring out where and how to start programming is daunting; the good news is there are e-learning packages that can serve as a springboard to becoming a skilled programmer. Case in point: the Master Learn to Code 2021 Certification Bundle contains 119 hours of content on HTML, data science and other programming languages to help you kick-start a lucrative developer or data scientist career. For

Read more

Report: 40% of SaaS application users have lost data

Ahead of World Backup Day, it’s a good reminder for companies of all sizes to ensure they have complete, usable backups for key business apps, says Rewind.

Image: World Backup Day

Forty percent of people have lost data stored in their online tools, according to the findings from a recent survey of Software-as-a-Service (SaaS) users across a mix of industries by cloud backup provider Rewind. The company is encouraging businesses of all sizes to assess their current cloud data protection initiatives and have comprehensive backups in place for primary business applications ahead of World Backup Day on March 31.

Rewind found that while more than half (53%) of respondents cited using SaaS tools on the job, and some (43%) even used four or more, many users (45%) still were not aware of the Shared Responsibility Model. Therefore, they do not realize that while SaaS providers actively back up their own

Read more

Tech workers says their salaries have increased. But so have their mental health concerns

Tech salaries may have risen for some, but the extra workloads faced by IT professionals during the pandemic have driven mental health concerns to a new high, according to new data.

Tech workers have enjoyed working from home, but increased workloads have also had an impact on mental health

iStock/ SeventyFour

Tech workers have been rewarded for their efforts to keep businesses up and running throughout the pandemic, but the impact on their workload has pushed mental health concerns to a new high, according to new data.

This year’s Harvey Nash Group Technology & Talent Study found that more than half (55%) of IT professionals globally reported heavier workloads in the past year, as the pandemic forced businesses to deploy remote working en masse and ramp-up digital initiatives.

While more than a third (36%) of tech workers said they had received an increase in salary, the extra burden has taken

Read more

REvil continues ransomware attack streak with takeover of laptop maker Acer

REvil previously infected the networks of Honda, the makers of Jack Daniels and a high-profile law firm representing Donald Trump.

Image: Acer

Cyberattackers behind the REvil ransomware have claimed another victim, this time global laptop conglomerate Acer, and are demanding a record $50 million ransom. 

First reported by Bleeping Computer, the attackers announced that they had breached Acer’s systems on Friday by posting financial documents and bank forms from the Taiwanese laptop, desktop and monitor maker.

SEE: Identity theft protection policy (TechRepublic Premium)

Acer sent out the same statement to multiple news outlets, refusing to confirm or deny the attack and only saying companies like it “are constantly under attack, and we have reported recent abnormal situations observed to the relevant law enforcement and data protection authorities in multiple countries.”

“Acer discovered abnormalities from March and immediately initiated security and precautionary measures. Acer’s internal security mechanisms proactively detected the abnormality,

Read more

Do open source users have a moral obligation to the community? One expert weighs in

Commentary: Bryan Cantrill has been helping to shape open source for decades, and he now feels it has become too rules-based and not principles-based.

Image: iStock

In open source, we spend so much time talking about licensing that it’s easy to overlook the reality that open source really isn’t about licensing at all. Not the heart of open source, anyway. At its best, open source is about community and shared mores that prompt us to contribute toward common goals. At its worst open source is about micromanaging and enforcing the behaviors we, as the original author of the software, may desire.

In a recent podcast, Oxide Computer cofounder and longtime open source executive Bryan Cantrill called this a conflict between rules-based open source and principles-based open source. The former encourages legalistic approaches to open source license compliance; the latter fosters communal creation of great software. Which does he think is

Read more

Batter up: MLB, Extreme extend partnership to bullpen and dugout Wi-Fi

Extreme Networks will install Wi-Fi 6 access points in bullpens and dugouts across all 30 ballparks to support the use of in-game iPads.

Image: iStock/rcp

It’s a likely home run, because Major League Baseball (MLB) and Extreme Networks are expanding their partnership. This week, MLB announced that Extreme Networks will install Wi-Fi 6 access points in bullpens and dugouts across all 30 ballparks to support the use of in-game iPads. This comes as a follow up to last month’s announcement both on the partnership and that Extreme is now the official Wi-Fi solutions provider of MLBand, at that time, will provide Wi-Fi 6 to 16 ballparks.

Issued and fully controlled by MLB, the iPads will supply video footage of the game, including multiple camera angles, slo-mo and freeze frame, to players and staff for use and analysis while the ball is in play. 

SEE: Incident response policy (TechRepublic Premium)


Read more

PS5 phishing scam baits gamers with promise of free console

Scammers are taking advantage of a shortage of Sony PlayStation 5 consoles to try to hoodwink people eager to snag one, says Kaspersky.

Image: Sony

Cybercriminals behind phishing campaigns have a knack for knowing which trends and topics will catch the eye of potential victims. Sony’s new PS5 is one topic ripe for exploitation, especially since the new console is in short supply due to a scarcity of semiconductor chips. A Friday report from security firm Kaspersky explains how a new scam promising a PS5 is playing out and offer tips on how to avoid taking the bait.

SEE: Hiring Kit: Game Developer (TechRepublic Premium)

How this scam works

Dangling the prize of a PS5 console, the scammers behind this ploy start with phishing emails that promise recipients a chance to win a new PlayStation 5. The contest is apparently “free for everyone,” with only your email required (at least

Read more