0 Comments

How to install sbt on Ubuntu For Scala and Java projects

Looking to work with Scala or Java on Linux? If so, you’ll want the Scala Build Tool up and running. Scala is a general-purpose, object-oriented programming language that is influenced by Java. In fact, Scala projects can be coded in the same way as Java projects. As well, a number of Java libraries (as well […]

0 Comments

How to hide columns or rows in Google Sheets

Learn how to hide columns or rows to reduce data entry errors, narrow focus, more easily compare data, or insert more columns or rows to increase the size of your Google Sheet. What’s Hot at TechRepublic When you create a new Google Sheet, the sheet typically starts with 26 columns (labeled A through Z) and […]

0 Comments

75% of SMBs aren’t worried about AI killing their jobs

The majority of small business owners in the US don’t believe artificial intelligence will overtake their profession, according to a GoDaddy report. More about Innovation The rise in automation and artificial intelligence (AI) has plagued many industries with fears of job elimination. However, small to medium sized businesses (SMBs) don’t have the same concerns: 75% […]

0 Comments

Google Chrome 76 promises better performance, simpler asynchronous coding for JavaScript programming language

Chrome 76 is here, with a range of improvements targeted at web developers. The latest version of Google’s Chrome browser is out, bringing with it a range of performance and quality of life improvements for web developers. Chrome 76 changes how the browser handles structured data and makes it easier for developers to write code […]

0 Comments

5 experimental cybersecurity trends your business needs to know about

These early-stage security trends have not yet seen widespread adoption, but may in the near future, according to CB Insights. Cybersecurity is becoming a major priority across all industries, as enterprises seek out technologies and tactics to protect their data from increasingly sophisticated threats, according to CB Insights’ NExxTT Framework: Emerging Trends in Cybersecurity report, […]

0 Comments

IT pros are least likely employees to quit because of company leadership

Only 16% of IT professionals quit their job because of poor management, but the same can’t be said for HR workers, according to a Randstad report. More for CXOs While leadership is a top reason most people quit their jobs, only 16% of tech professionals point to leadership as their motivating factor for leaving a […]

0 Comments

Capital One is not alone: 3.5B malicious login attacks target banks and customers

Phishing and credential stuffing attacks are top threats to financial services organizations and customers, according to Akamai. In the wake of the massive Capital One data breach, many IT and security experts are paying close attention to the risks posed to the financial industry, and with good reason: Cybercriminals launched 3.5 billion credential stuffing attack […]

0 Comments

iOS and Android patched 440 security vulnerabilities in 2019, so far

Android patched more CVEs than Apple did, according to a Zimperium report. Some 60% of endpoints containing or accessing enterprise data are now mobile—and the majority of those do not have adequate security protections, according to Zimperium’s State of Enterprise Mobile Security Report, released Wednesday. More than a quarter (27%) of enterprise mobile endpoints were […]

0 Comments

Hands-on review: Dell Latitude 7400 2-in-1

Dell’s Latitude 7400 2-in-1 tries to deliver a little bit of everything for every potential use case, resulting in a 14-inch ultraportable with a 360-degree hinge, with active stylus input. Dell’s Latitude line of notebooks for business is positioned against Lenovo’s ThinkPad and HP’s EliteBook and ZBook series. The Latitude 7400 2-in-1 tries to deliver […]

0 Comments

SanDisk’s SSD Dashboard uses hardcoded password, lacks encrypted updates

Lackadaisical security practices in proprietary management software from a hardware vendor underscore the need for a vendor-agnostic solution. Device and component vendors are fond of producing add-on software for device management and configuration, though the value of these utilities range from minimally useful to actively detrimental. SanDisk (and Western Digital, as the owner of that […]