In our new infographic, we share information on the positive impact that DevOps has on IT.
Data Center POST recently spoke with Liquid Technology’s Managing Partner, Richard Greene, to learn what it takes to safely and securely execute data destruction, e-waste recycling, and computer liquidation. Read on to learn more. 1.Can you give some insight into the genesis of Liquid Technology and what you do? As one of the industry’s leading IT asset disposition service providers, Liquid Technology offers a suite of effective and impartial solutions for data destruction, e-waste recycling, and computer liquidation. With nearly 20 years of experience in IT asset disposition (ITAD), […]
Each year new trends emerge in technology. This year, A.I., blockchain, biometrics and a host of other trends are being used to keep technology secure. Which cybersecurity trends are on top? Our latest infographic shares some of the top cybersecurity trends of 2018.
Whether a company regularly upgrades IT equipment to keep pace with cutting edge technologies, is migrating to the cloud, or simply finds itself with end-of-life hardware it no longer needs, all face the same dilemma: what to do with the no longer needed legacy equipment. Companies faced with this predicament soon realize the problem of excess technology is much more complex than what they face when simply updating their office furniture. Here are three reasons why e-waste may be your next big problem: 1) Improperly Recycled e-Waste Can Negatively Impact […]
Digital privacy has become a hot-button issue especially after GDPR and ongoing investigations of the social media giant, Facebook. How can organizations prepare for further online privacy regulations? One way is to consider implementing Privacy by Design (PbD). Privacy expert, Dr. Ann Cavoukian developed the framework of PbD in 1995. The concept proactively builds privacy into the design specifications of information technologies, networked infrastructure and business practices. PbD claims to provide organizations with the strongest protection possible. In 2010, officials at the International Conference of Data Protection Authorities and Privacy […]