For employers, hiring and retaining young employees has become more difficult than ever before. Today’s young IT workers are often looking for different things in a job than their older counterparts are.
Both research and anecdotal evidence suggest that the millennial generation, those born between 1981 and 2000, behave and think quite differently than previous generations. In comparison with other Americans, people in their 20s and early 30s are more likely to be liberal democrats, less likely to own their own home, less likely to be married, more likely to have a lot of debt and more likely to enjoy digital activities like video games and social media.
The Xconomy San Diego Forum on the Human Impact of Innovation offered a window into how information technology and science, marching hand-in-hand, will shape healthcare. “IBM’s Watson is not the only breakthrough game in healthcare,” was the best summary of the afternoon.
Today’s unpredictable markets demand that as you maximize performance from your current business model, you must in parallel be designing and developing new business models to disrupt the current cash generators. Otherwise, start-ups will turn your company into a dinosaur.
Big Wall Street companies are using a complicated technology called blockchain to further increase the already lightning-fast speed of international finance. But it’s not just the upper crust of high finance who can benefit from this new technology.
Most simply, a blockchain is an inexpensive and transparent way to record transactions. People who don’t know each other – and therefore may not trust each other – can securely exchange money without fear of fraud or theft. Major aid agencies, nonprofits and startup companies are working to extend blockchain systems across the developing world to help poor people around the world get easier access to banks for loans or to protect their savings.
When the cybersecurity industry warns of digital threats to the “internet of things,” the targets that come to mind are ill-conceived, insecure consumer products like hackable lightbulbs and refrigerators. But one group of researchers has shown how hackers can perform far more serious physical sabotage: tweaking an industrial robotic arm to cost millions of dollars worth of product defects, and possibly to damage the machinery itself or its human operator.
Among our greatest enemies, as individuals, as organizations, and as a society are the false biases that justify an attitude of “us and them” –in a word, discrimination. Fortunately it’s one of the areas where we’ve made the most progress over the past 100 years.
Yet, there is one area where even the most tolerant among us feels it’s totally justified to discriminate with utter abandon; millennials and Gen Z.
Have you ever seen your nieces or nephews or a high school friend after a ten year hiatus? You are amazed at how much they have changed. You wonder when did they grow up? It seemingly happened overnight and that is slightly disconcerting.
Time and absence can play that trick on science too. In April 2008, I reported in these “pages” on the Stem cell frontier on display at Promega. In that conference, UW Scientist, Jamie Thomson, gave an update on his recent discovery on how to turn fully differentiated, mature cells into new stem cells that could, via biological magic, turn into any different mature tissue cell type.
But today, the utilities sector is under pressure to simultaneously reduce costs and improve operational performance.
Utilities are a bit late in digital innovations than retail, banking or insurance. With energy getting on the digital bandwagon with online customer engagement, smart sensors and better use of analytics, utilities are now beginning to adopt it.
President Donald Trump has signed an executive order creating the American Technology Council, an organization tasked with modernizing the federal government’s IT systems and the digital services they offer U.S. citizens. This could be good news for the Department of Health and Human Services, a federal agency badly in need of an IT tune-up.
University of Wisconsin, Madison, CIO Bruce Maas offers pointers on why CIOs and information technology leaders shouldn’t shy away from scaling opportunities. CIOs and information technology leaders should embrace and initiate scaling projects to thrive in the evolving world of IT.
Did you feel a sudden loss of Internet freedom in February 2015? That’s when the Federal Communications Commission imposed net neutrality rules that prevent Internet service providers from discriminating against websites and other online services. And that’s when Americans lost their Internet freedom—according to the current FCC chairman, Ajit Pai.
What began as a straightforward software contract with Epic resulted this week in the U.S. Coast Guard starting its entire EHR acquisition process over some seven years after it began. EHR implementations are notorious budget-busters often fraught with missed deadlines and other unforeseen complications, but for an organization to abandon the project altogether and embark on a new beginning is uncommon.
Cybercriminals use sophisticated technology to rake in millions of dollars in scammed and stolen money across the globe, and cost their victims millions more to clean up the messes they leave behind. When police try to break up these online rings, they find a whole set of obstacles that are different from crimefighting in the physical world. Cybersecurity researchers Frank Cilluffo and Alec Nadeau, along with Europol Director Rob Wainwright, reviewed the multinational effort to take down a massive cybercrime network. What they learned is both surprising and immediately useful.
Net-A-Porter didn’t know how much money it was leaving on the table when the Web site failed to keep up with traffic. New microservices captured it.
Luxury fashion might seem to be an unlikely space to suffer from sudden onslaughts of high traffic, given the non-mass marketing approach that luxury by definition implies. If millions of consumers are involved, then how luxurious can it be
The first mistake companies make while trying to protect their digital assets is to believe they can be secure. “Forget aspiring to full protection. Hacking is black magic engaged in by a ton of bad guys from Russia to Romania whose citizens do not necessarily view them as the bad guys,” Eric Cornelius shared at Fusion 2017.
The deputy director of the New Jersey Office of Homeland Security and Preparedness, Steve Gutkin, explains how building strategic public and private partnerships can help protect a country’s critical infrastructure and offers pointers on nurturing such alliances.
Wearables are now a significant part of corporate wellness and remote patient monitoring programs. However, long-term investment from seniors remains a challenge, despite an increasing need for seniors to have better healthcare options.
Garmin and Tactio Health Group, two major companies involved in telehealth and wearable technology, are combining forces to provide a telehealth solution specially designed to monitor the daily health and well-being of seniors.
A couple of weeks ago I met with the email management and security vendor Retarus. While I was unfamiliar with the company (and it had a reasonably standard portfolio, I thought at first glance), my interest was piqued because it was German, and the country is very particular about such questions as personal data, privacy and so on.
State of Wisconsin CIO David Cagigal and CISO Bill Nash offer pointers on how a strategic CIO-CISO partnership can help drive and prioritize cybersecurity. They enumerate the elements that help drive an optimal CIO-CISO partnership and offer pointers on how to evade tensions in their relationship. They stressed that communication between their roles is vital to prioritizing cybersecurity efforts.
Microsoft is launching IoT Central today, a new Internet of Things (IoT) service that gives enterprises a fully managed solution for setting up their IoT deployments without needing the in-house expertise necessary for deploying a cloud-based IoT solution from scratch. It’s basically IoT-as-a-Service.
In addition, the company is bringing its Azure Stream Analytics to edge devices, making it easier to provision new IoT devices, and it’s launching a completely new analytics service for time series data.
When it comes to keeping confidential data locked down, it turns out that even employees trained in cybersecurity best practices still don’t always know how to protect sensitive information, according to the Dell End-User Security Survey 2017 released today.
While employees don’t want their companies to fall victim to a security breach, they also prefer to avoid security policies that limit their workplace productivity and daily activities, the survey found.