Technology news for New Zealand's largest enterprises
Kai Ping Lew
These search results are from across the Techday network of sites
Programmable money will redraw the map of international trade
Those who control the most widely used currencies also control a great deal of the global economy, and it is time for New Zealand to get in the game.
How user-centred design is reshaping cybersecurity
A user-centered design approach starts with users and asking them what they want to gain a deeper understanding of their needs.
Predictions: How process and workflow automation will evolve in 2020
Those who have started the journey with workflow automation will expand their efforts while some businesses who have yet to begin will get to work.
Unpopular opinion: The software monolith is wrongly maligned
We’re led to believe microservices are modern and monoliths are legacy - but it’s not that easy, writes Segment’s Alexandra Noonan and Calvin-French Owen.
Why zero trust is the best security strategy for mobile computing - Zscaler
Zero trust network access is helping organisations address the protection problem posed by mobile computing and cloud-based applications.
Why AI is your friend when it comes to cloud migration
Modern web-scale cloud applications are simply too complex to be operated by humans alone.
Addressing the cybersecurity skills gap
Cybersecurity is consistently rated as one of the most problematic skills shortage areas in the enterprise, Skillsoft says.
Why VoIP solutions are the future of phone systems
Chorus is considering potentially decommissioning copper lines in places where fibre is available, meaning homes and businesses in these areas would have to move to fibre.
Australia’s digital transformation: Can’t sweat it? Don’t sweat it
What may have seemed a short-term benefit may soon change: a monthly subscription from a public cloud provider may suddenly turn to bill shock after the realisation that it can’t be turned off.
How to protect Industrial IoT from ransomware
Ransomware outbreaks in 2017 hit production networks worldwide, resulting in shutdowns, massive clean-up efforts and millions of dollars in damages, Claroty finds.
Time to turn the tables on cyber-attackers
Cyberattackers are no strangers to deception and trickery, and emerging ‘deception technology’ is giving the defending team an opportunity to turn the tables in their favour, Attivo finds.
Getting value from software observability
Organisations now routinely mine software performance data to achieve ambitious business results, says New Relic.
Hands-on review: The ASUS Lyra Voice is a smart router with the power of invisibility
It looks no different from a set of standard Bluetooth speakers, and it easily blends itself into any corner of the house.
Ditch the nerd knobs: Converting data into dollars with open source
Once an outlier used only by the cost-conscious, open source’s prominence has expanded on the back of significant improvements in quality of software.
Safeguarding against AI-based cyber-attacks
Fraudsters using AI to mimic voices is just an evolution in technology, says Wontok.
How SMS became the trusted mode of customer communications
About 90 percent of text messages are read within three minutes of receipt and we’re seven times more likely to respond to a text than an email.
How to level up Australia’s cybersecurity productivity – CrowdStrike
The Productivity Bulletin showed that productivity levels in Australia has been declining in key industries since 2013, falling behind global peers.
Digital optimisation makes HR processes easier - Hyland
Although we tend to think of data breaches as the work of malicious hackers, carelessness and mishandling of sensitive documents are just as likely to be the culprit.
The human eye as a proxy for the future of networking
In recent years scientists have been unravelling the intricate structure and wiring of retina neurons within the eye - Mellanox Technologies looks beneath the surface.
How cloud technologies are shaping the data-driven contact centre
According to a global Ecosystm cloud study, more than half (53%) of organisations have increased work processes and efficiency as a result of using the cloud.
Interview: Catalyst Cloud on the second wave of cloud innovation
The demand and use of containers and Kubernetes come from a deep realisation that there is a better way to package, deploy and run applications.
The key performance metrics to monitor for perfect server visibility
Organisations need to have server monitoring tools that cover the right performance indicators that fit the applications they have running on their servers.
BitSight and ServiceNow announce integrations improving cyber risk management
Together, BitSight and ServiceNow provide organisations with prioritised visibility and automated workflows to manage cyber risk.
Application shielding startup RedShield raises $14m
RedShield CEO and co-founder Andy Prow says that taking capital from a New Zealand private equity player was a strategic choice.