Remove Groups Remove Social Remove Software Review Remove Technical Review
article thumbnail

6 most underhyped technologies in IT — plus one that’s not dead yet

CIO

Generative AI and, more specifically, ChatGPT captivated the corporate world in 2023, with board directors, CEOs, and other executives fawning (and sometimes fearing) the technology. But with all due respect, AI is hardly the only critical tech in town. But with all due respect, AI is hardly the only critical tech in town.

article thumbnail

The extent Automic’s group CIO goes to reconcile data

CIO

In addition to its technology solution, it has a range of professional services that covers company secretaries, investor and media relations, employees, environment, and social governance, among others. But investors were adamant you could build a tech company with just engineers. It’s the same with offboarding.

Groups 278
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TechCrunch+ roundup: Gen Z VCs, choosing a GTM model, crypto crisis communication tips

TechCrunch

Generation Z is stereotyped as being materialistic, mistrustful and extremely reliant on personal technology. Use discount code TCPLUSROUNDUP to save 20% off a one- or two-year subscription. The majority of early-stage VC deals fall apart in due diligence. The majority of early-stage VC deals fall apart in due diligence.

article thumbnail

Gen Z social app Yubo rolls out age ‘estimating’ technology to better identify minors using its service

TechCrunch

Yubo , a social livestreaming app popular with a Gen Z audience, announced today it’s becoming one of the first major social platforms to adopt a new age verification technique that uses live image capture technology to identify minors using its app, in order to keep them separated from adult users.

article thumbnail

CIOs in transition: 5 tips for landing your next IT leadership job

CIO

While you may have planned or negotiated an exit, very often such departures are beyond your direct control, due to a leadership change, acquisition, or another strategic event. They manage networking with other professional development activities such as attending conferences, reading leadership books, and participating in social media.

article thumbnail

What you need to know about Okta’s security breach

CIO

Identity attacks use social engineering, prompt-bombing, bribing employees for 2FA codes, and session hijacking (among many techniques) to get privileged access. A DLP-like technology can be effective in preventing users from uploading files with sensitive data unknowingly.

article thumbnail

53 Questions Developers Should Ask Innovators

TechEmpower CTO

At TechEmpower, we frequently talk to startup founders, CEOs, product leaders, and other innovators about their next big tech initiative. After all, that’s what tech innovation is all about. Ads, Viral/Social, SEO)? Do you have a custom algorithm or other technology? But there are some common elements too.