Technology Articles
Technology. It makes the world go 'round. And whether you're a self-confessed techie or a total newbie, you'll find something to love among our hundreds of technology articles and books.
Articles From Technology
Filter Results
Cheat Sheet / Updated 04-12-2024
SQL is a popular and useful programming language. You can make SQL even more useful if you know the phases of SQL development, the criteria for normal forms, the data types used by SQL, a little bit about set and value functions, as well as some tips on how to filter tables with WHERE clauses.
View Cheat SheetCheat Sheet / Updated 04-12-2024
Python is a flexible programming language that has become increasingly popular in the past few years. This cheat sheet is designed to give you a handy resource for common Python data types, Python operators, and Python functions. It includes Python data types, operators, special characters, f-strings, and functions for working with robots.
View Cheat SheetCheat Sheet / Updated 04-12-2024
A wide range of tools is available that are designed to help big businesses and small take advantage of the data science revolution. Among the most essential of these tools are Microsoft Power BI, Tableau, SQL, and the R and Python programming languages.
View Cheat SheetCheat Sheet / Updated 03-27-2024
To be fully functional in today's society, you have to possess digital literacy — the knowledge of using computers in the many ways they enhance our work, home, school, and entertainment. Being digitally literate means you know the handiest tricks for surfing the web, keyboard shortcuts to get stuff done fast in Windows 8, and more keyboard shortcuts to help you work efficiently in Word and Excel.
View Cheat SheetArticle / Updated 03-26-2024
Interest in artificial intelligence (AI) is growing, and the power of AI can, and should, be leveraged for use in customer experience (CX) to benefit your external and internal stakeholders: your customers, agents, and supervisors. Delighting your customers Your customers have a stake in your business, and you wouldn’t be where you are without them. Today’s external stakeholders — your customers — crave digital self-service, and it drives their interactions. Companies may often underestimate this desire. Customers want and expect (even demand) options that meet their personalized needs for up-to-date information and assistance, and they want this without having to talk directly with another person. With AI, you can help make that happen. AI promises usefulness across all types of customer interactions, including searching for information, using a chatbot, interacting with people, and more. With AI for CX, you can host a safe, secure environment for CX to occur. And keep in mind this little techie tidbit: Roughly 30 percent of transactions were supported by automation in 2023, and about 70 percent will be in 2025. The incorporation of AI into your CX is vital to your brand. The NICE Enlighten Suite is trusted AI for business and utilizes the latest GenAI technology and the largest labeled dataset of omnichannel CX interactions to create positive customer experiences. Within the suite, Enlighten Autopilot, focusing on customers, delivers personalized, business-aligned conversational AI experiences to thrill your customers in the following ways: • Meeting customers on their preferred channels • Seamless engagement across all touchpoints • Providing a consistent and unified experience • Having data-driven decision-making • Strengthening brand perception Visit www.nice.com/websites/CX.AI.NOW/ to learn more. Supporting your staff The use of AI can also impact your internal stakeholders, and those folks include your agents and supervisors. Most employees will see the positive effects of AI, but when you deploy AI for CX within your organization, seek to reassure everyone that you expect the technology to benefit them. Don’t forget to ask for feedback on their experiences with it, too. The benefits of such technology include Improving employee experience: AI has the potential to positively impact your employees throughout your organization. Agents’ work experiences can be improved and optimized, which helps the organization as a whole to operate more efficiently. Better management information: Make key information more accessible to more people within your business, including your supervisors. With AI, this information can be delivered faster and more conveniently than ever. Generative AI as part of the CX is a powerful positive for your agents, supervisors, and even your brand. Your organization may be able to realize higher sales, greater customer satisfaction, and a better brand image by taking advantage emerging technologies. You need a trusted AI solution for your business. Enter Enlighten Copilot. This solution’s primary function is to empower agents and supervisors with in-the-moment assistance and coaching to deliver premium interactions and to make their jobs easier by offering a variety of versatile features designed to elevate CX and drive success. Copilot also delivers security, privacy, and compliance to help you meet the legal, regulatory, and safety concerns of your company. When companies start to offer AI-powered capabilities on their own, these concerns may be ignored simply out of a lack of knowledge of what AI entails. Enlighten Copilot also seeks to strengthen, not replace, your employee base by targeting AI toward highly repetitive, lower-touch and lower-value interactions. That leaves your agents free for the higher-touch, higher-value interactions. Supervisors also benefit from AI-driven tools to free themselves from repetitive management tasks and to improve decision making. Visit get.nice.com/Not-All-AI-Copilots-Are-Equal.html for more information.
View ArticleCheat Sheet / Updated 03-26-2024
If you want to build your own website from start to finish, this book serves as a great resource. It includes many secrets and best practices that web developers know and implement when building any quality website. This cheat sheet includes bits and pieces of what you'll find in the book.
View Cheat SheetCheat Sheet / Updated 03-26-2024
Can't wait to use your new iPad? The Apple iPad neatly combines an audio and video iPod, an e-book reader, a powerful internet communications device, a handheld gaming device, and a platform for millions of apps. After you open the box and see what’s inside, you need to know about its buttons and controls and how to use the multitouch display. And if you ever catch your iPad behaving badly, check out the five tips for setting your iPad back on track.
View Cheat SheetCheat Sheet / Updated 03-22-2024
Generative AI coding tools can improve your productivity as a coder, remind you about syntax, and even help you with testing, debugging, refactoring, and documentation, but it's up to you to know how to use them correctly. Get ten prompt engineering tips that can make the difference between AI spitting out garbage spaghetti code and crafting elegant code that works. AI coding tools present unique challenges and hazards for software development teams, so check out some simple rules to make sure that generative AI doesn't tank your project. Then see what happened when ChatGPT was asked to list the top things human coders do that AI can never replace.
View Cheat SheetArticle / Updated 03-12-2024
Advanced email threats use a wide range of methods to attack company security, including sophisticated technology and an in-depth understanding of the weak points in the way that email recipients and senders communicate. To fight them, companies need to use tools including threat detection, threat hunting, and extended detection and response (XDR) technology. Here are ten things you can use to protect against advanced email threats. Use secure email threat defense Use a comprehensive email security solution to detect quickly and respond effectively. Look for an email defense system that automatically and reliably does many of the things that you might wish users would do consistently, such as: Assess the sender’s reputation Asses the reputation of the email’s source URL Scan content for concerning words and phrases Scan file attachments and analyze their reputation and content Spot and block spam Optimize your defenses against major email threats You can scan the horizon for current threats and note what threats are being blocked — or causing breaches — at your organization. You can then respond by working with your vendor; working with your email provider; training your security personnel and end users; educating upper management; and many more steps. Use AI to understand and categorize threats You can use AI to identify patterns that serve as indicators of an attack. These patterns are often so subtle that attackers aren’t aware of the breadcrumbs they’re leaving as they put together attempts at exploits. AI can spot these patterns before the bad actors do. Use threat data to inform and expedite your response Before a threat arrives, you can know: What the recent patterns of threats look like The signatures left by different kinds of threats What attacks are leading to successful breaches The best response to each different kind of breach By using threat data, you help yourself at every step of the “funnel” of security breaches: reducing the number of attacks that reach user inboxes, reducing the impact when a malicious email is opened or a toxic file attachment is downloaded, and responding quickly and effectively to the remaining breaches that do occur. Act quickly to ensure maximum protection against threats By acting automatically against many threats, and by providing alerts and information about the threats that do appear, the best email security solutions give you a precious gift in responding to any remaining breaches: time. With a solution in place, your best people are empowered to respond quickly and effectively to the breaches that do occur, while directing their focus to strategic efforts such as studying the breach, understanding how it occurred, and taking the steps needed to prevent a recurrence. Unify visibility across control points Look for a security provider that helps you unify visibility across multiple control points so you can, for instance, tie the damage that’s occurring from a successful breach to the original gaps in your defenses that allowed it to occur. You can then “mind the gap” and prevent the problem from recurring in the future. Embrace automated tools to maximize resources Automated tools save your people’s time and focus for the largest potential threats. These tools also allow your team to find a solution and then “set it and forget it,” using the automated tools to prevent the same problem from happening again. Detect sooner, respond faster You can’t solve a problem you don’t know you have — and most cybersecurity breaches get worse the longer it takes you to respond. Effective security solutions buy you time, removing some threats and giving you early notice of others. Getting started Visit Cisco.com and download your free copy of Advanced Email Threats For Dummies to learn more about advanced email threats.
View ArticleArticle / Updated 03-11-2024
What is XDR? It’s a recent addition to the swarm of acronyms bouncing around the business technology space. XDR platforms include tools for incident response, threat hunting, automation, threat detection, visualization, threat management, and more. What brings it all together is a centralized viewpoint of your entire security infrastructure. Here are ten things you need to know about XDR including some key features to look for when shopping for an XDR solution. Reduce time to detect and respond At the end of the day, XDR platforms aim to reduce detection and response times. More data and more tools don’t mean faster security teams. They often mean overwhelmed security teams. XDR focuses on providing actionable information through machine learning-supported analytics and a centralized dashboard. On the response side, orchestration and automation features streamline the response process by providing easy-to-use and customizable tools for security staff. Visualize integrated security data XDR takes in a lot of information and must organize it to reduce alert fatigue, false positives, and general security operations hassle. Central dashboards are customizable information hubs for security teams to organize their data to fit the organization’s needs. Visualization tools such as incident maps should help identify threat sources and trace potentially new attack points. Precise monitoring Because XDR platforms usually come with machine learning-based analytics, and rely on secondary security tools for data collection, security teams should have a clear view of an organization’s ecosystem. Providing good information, rather than lots of information, cleans up what staff actually see, making it easier to focus on legitimate security concerns. Contextualize alerts and reduce false positives XDR’s centralized dashboard features provide context to security situations. Alerts coming in are more reliable because the XDR system has the relevant threat intelligence required to make decisions about what is concerning, abnormal behavior and what isn’t. False positives are a waste of resources, and XDR’s comprehensive view of the IT infrastructure helps reduce their frequency. Automated responses Automation features have been around in the security space for some time, but XDR’s broad reach enables its automation tools to benefit from some fine-tuning. Many XDR products offer machine learning-supported automation that can take care of rote security tasks, so security staff can work on the harder jobs that need human intervention. Keep it open XDR isn’t a lone wolf and needs the support of specialized security tools. XDR platforms offer a lot of integration options, both with existing security tools and ones that may be added in the future. Endpoint detection and response (EDR) and network detection and response (NDR) in particular are two tools to think about including when building out your security infrastructure. Store and analyze logs at scale Because of the powerful analytics tools XDR brings in, these platforms are able to process large amounts of security data. XDR solutions are easily scalable so your organization can grow over time, without worrying how your security analytics will have to change. Address compliance requirements The large amount of data that can be processed by XDR also means compliance and industry regulation requirements can be confidently met. Organizations involved in healthcare or finance are especially in need of extensive logging and analysis tools. Siloed solutions are partial solutions Security infrastructure has become so vast that siloing systems has become common. Enterprise-level IT infrastructure can’t rely on this separation of systems, as attackers expand and develop their attack strategies. Incomplete security information can lead to false positives and alert fatigue, because monitoring tools won’t have the full context of suspicious activity. Remember the human factors The security personnel managing these tools are the most important part of any successful IT security environment. Inefficient security solutions overwork security staff by burdening them with false positive threats, unnecessary alerts that lead to alert fatigue, and lackluster identification and response tools that slow them down. Getting started Visit Cisco.com and download your free copy of Extended Detection and Response (XDR) For Dummies, 2nd Cisco Special Edition to learn more about topic.
View Article