Whether a company regularly upgrades IT equipment to keep pace with cutting edge technologies, is migrating to the cloud, or simply finds itself with end-of-life hardware it no longer needs, all face the same dilemma: what to do with the no longer needed legacy equipment. Companies faced with this predicament soon realize the problem of excess technology is much more complex than what they face when simply updating their office furniture. Here are three reasons why e-waste may be your next big problem: 1) Improperly Recycled e-Waste Can Negatively Impact […]
Digital privacy has become a hot-button issue especially after GDPR and ongoing investigations of the social media giant, Facebook. How can organizations prepare for further online privacy regulations? One way is to consider implementing Privacy by Design (PbD). Privacy expert, Dr. Ann Cavoukian developed the framework of PbD in 1995. The concept proactively builds privacy into the design specifications of information technologies, networked infrastructure and business practices. PbD claims to provide organizations with the strongest protection possible. In 2010, officials at the International Conference of Data Protection Authorities and Privacy […]
Although computers entered the financial services sector as early as the 1960s, it was the advent of the internet and low-cost computer hardware in the ‘90s that fueled the emergence of all-electronic trading platforms. Fast-forward to today, and a financial system that began with mainframe computers has become a digital information ecosystem that is increasingly reliant on such next-generation technologies such as Artificial Intelligence, Big Data algorithms and cloud. To keep up, firms that engage in high-frequency trading (HFT), must regularly invest in new tech equipment to be at the […]
In our new infographic, we illustrate how to recycle plastics and how specific plastics are re-purposed.
Level One Robotics and Controls, a Canadian engineering service provider, is at the core of a massive data breach for automakers. 157 GB of highly sensitive data was exposed from over 100 companies including Ford, GM, Tesla, Toyota, Chrysler, Fiat, and Volkswagen. The data was accessed by a security researcher who classified the data into three categories: customer, employee and Level One data. The data included assembly line schematics, factory floor plans layouts, robotic configurations, animations, and documentation. The Level One business data ranged from contracts to bank account details. […]