article thumbnail

Diversity and inclusion: 7 best practices for changing your culture

CIO Business Intelligence

And the murder of George Floyd — and the social unrest that followed — made it clear that taking a stand around social justice is necessary to recruitment, retention, and even the viability of your brand. That is all part of being authentic.” asks Adriana Gascoigne, founder and CEO at Girls in Tech. “Do

Groups 140
article thumbnail

Cloud Musings by Kevin L. Jackson: IBM Debate Series - What's.

Cloud Musings

Next week I will be participating in the inaugural session of What’s Next in IT Debate Series , a new program of authentic debates and conversations on key technology topics. ► 2008. ► August. (10). ► July. (13). ► June. (10). ► May. (8). ► April. (11). ► March. (13). ► February. (14).

IBM 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. The same thing is happening with social networks. So the excuses are running out.

Trends 60
article thumbnail

29 Entrepreneurs Explain How They Came Up With Their Business Name

Computer Weekly

My posts gained traction and — after I was lost my job following the 2008 market crash — peers encouraged me to develop not just content for the site, whose focused on the crossroads of arts and politics, but the business of blogging as well. Graffiti is a form of self expression and a form of street art which is authentic.

Media 203
article thumbnail

HackerOne CEO Mårten Mickos: COVID-19 is ‘the planet’s warning’ to accelerate digital civilization

GeekWire

A native of Finland, he’s the former CEO of MySQL, the open-source database company that was sold to Sun Microsystems in 2008. So WiFi, VPN, authentication, passwords, mobile phones and so on. So the criminals are, of course, going where the people go, and then there’s a lot of social hacking and scamming, phishing.

article thumbnail

How Blacks in Technology Foundation is ‘stomping the divide’

CIO Business Intelligence

When Greg Greenlee joined the IT industry in 2008, the lack of representation of Black IT professionals among attendees and speakers at tech conferences and events was readily apparent. “It Whether it’s workplace issues, social justice issues, or talking about engineering, and help each other along with our careers,” says Greenlee.

article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates

Sean Daniel

Although I plan on using Windows Home Server and Windows Small Business Server 2008 as examples here. I do have a previous post on understanding the self-issued certificate in SBS 2003 and SBS 2008 , as this post will focus on understanding trusted certificates, and what makes them trusted. Sure, I trust the state government.

Windows 45