Xtreme Podcast: Technology wonders and technology blunders

Welcome to the TechGenix weekly installment of the Xtreme Minute! This is a quick synopsis of what to expect in today’s TechGenix Xtreme Podcast with Louise Chalupiak and Peter King, including links to all the latest hot tech topics.

Our first article is by Stephen M.W., titled 15 cybersecurity terms even your non-techie employees must know. Stephen reminds us not only that we the people are still the weakest link, but also that cybersecurity learning is not a one-and-done thing for the enterprise. Along with being a great educational article, we are also given a fun way to test one’s knowledge level whether you’re a business user of technology or a seasoned technical professional.

Second up is a fun article from Brien Posey, titled Seven technological wonders of the modern world named. Do you agree? Brien shares the list from The Royal Academy of Engineering in the UK and as a bonus, he offers up his own candidates. If you would like to add your own additions (and we strongly encourage you to do so), please post them either in the comments section at the bottom of the article page or follow the comments link at the end of this article.

The final article we discuss today is from Mitch Tulloch, titled Business Risk: Manage it, ignore it, or outsource it? The multiple variables that exist in the world of business and the world of technology means that we can never totally eliminate risk. That said, we do have the ability to reduce the likelihood and we can ensure that we have a proactive plan in place. It’s all about managing risk and educating the enterprise that risk can not be ignored.

Don’t get schooled! Click here to join the TechGenix newsletter and keep up-to-the-minute on what’s happening in the world of technology and cybersecurity.

Click here to fax us your comments or add your items to our list of technological wonders.

Louise Chalupiak

Louise is a cynical and often irritating project manager currently residing in Calgary, Alberta, Canada who is not personally responsible for anything oil sands related. She often eats popcorn for dinner and fears that her dog judges her. Special skills include milking a cow as well as the ability to uncork a wine bottle without the use of a corkscrew.

Published by
Louise Chalupiak

Recent Posts

Review: Identity verification solution Specops Secure Service Desk

Specops Secure Service Desk is an innovative solution for positively identifying a user who calls…

13 hours ago

Apple Silicon: What it means for the world of personal computing

Apple is moving away from Intel processors to use its own Apple Silicon processors to…

17 hours ago

RAID 0 vs. RAID 1: When to use each level and why

Two of the most popular RAID levels for improving performance are RAID 0 and RAID…

20 hours ago

Got cybersecurity tools? Good. Got too many? That may be a problem

Strength in numbers may not apply to cybersecurity tools. In fact, using too many tools…

2 days ago

Getting started with System Center Operations Manager

System Center Operations Manager can monitor your IT resources, but the tool is only as…

2 days ago

Microsoft 365 administration: Creating DNS records for email security

Microsoft 365 administration has many facets, but none is more important than configuring email. Here’s…

2 days ago