Gartner has started talking about a new ‘stalking horse’ called the Digital Immune System (DIS). In fact they say “By 2025, organizations that invest in building digital immunity will increase customer satisfaction by decreasing downtime by 80%.” As you might imagine when a NonStop person hears about ‘reducing downtime’ and ‘increasing customer satisfaction’ our ears perk up.
Though hard to believe now, it wasn’t until the mid-90s that there was any sort of ‘life’ part in my Work-Life Balance equation. I’d just created a family and was raising twin boys on my own, and every summer we would venture to my family cabin that was located high on a hill on a lake in Ontario, Canada’s Algonquin Provincial Park.
Call it juxtaposition serendipity. Unpacking my bags following this year’s pan-European E-BITUG event in Edinburgh, Scotland, I happened to place this year’s celebratory coffee mug alongside one that I scored more than two decades ago when the European ITUG Spring Conference was held in Nice, France. The dates may indeed be separated by the years, but not the sentiment. The tradition that underpins these annual events is hard to ignore.
According to recent articles on the HR Exchange Network website by Michael Arena, the former Vice President of Talent Management & Development at Amazon Web Services (AWS), research has shown that though ‘Bonding Connections’ held up pretty well through the pandemic and the ongoing transition to more permanent hybrid work, ‘bridging connections’ have nose dived.
For the better part of the past two centuries, there is barely a time when modernization isn’t the subject of conversation. Attend any gallery opening, any new musical or any open house and very quickly the conversation turns to whether or not the item represents modernism. In other words, is it an indicator of things to come or is it just more of the same.
IceFire is standard-fare ransomware. It is a kind known as ‘big-game hunting’ (BGH) ransomware. What is BGH ransomware? It is a kind of ransomware that is characterized by a double extortion model that targets large enterprises, using numerous persistence mechanisms. It is very hard to detect since it covers it tracks by deleting log files.