#file-management

[ follow ]
Digital life
fromThe New Yorker
4 hours ago

The Anguish of Data Loss

Data preservation is crucial, yet digital devices are fragile and often treated carelessly, leading to significant loss when data is not backed up.
#dropbox
Software development
fromInfoQ
1 day ago

Dropbox Collaborates with GitHub to Reduce Monorepo Size from 87GB to 20GB

Dropbox engineers reduced their backend monorepo size from 87GB to 20GB by optimizing Git's storage and delta compression model.
DevOps
fromTNW | Apps
5 days ago

Dropbox is making ChatGPT its productivity hub with three new apps

Dropbox is launching three new apps inside ChatGPT to enhance productivity and streamline coordination tasks for knowledge workers.
Software development
fromInfoQ
1 day ago

Dropbox Collaborates with GitHub to Reduce Monorepo Size from 87GB to 20GB

Dropbox engineers reduced their backend monorepo size from 87GB to 20GB by optimizing Git's storage and delta compression model.
DevOps
fromTNW | Apps
5 days ago

Dropbox is making ChatGPT its productivity hub with three new apps

Dropbox is launching three new apps inside ChatGPT to enhance productivity and streamline coordination tasks for knowledge workers.
#cybersecurity
DevOps
fromSecuritymagazine
1 day ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Information security
fromSecuritymagazine
1 month ago

Document Protection: Why Hybrid Storage Is the Future of Security

A hybrid approach combining digital storage for frequently accessed documents and physical storage for sensitive historical information provides optimal security and efficiency.
DevOps
fromSecuritymagazine
1 day ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Information security
fromSecuritymagazine
1 month ago

Document Protection: Why Hybrid Storage Is the Future of Security

A hybrid approach combining digital storage for frequently accessed documents and physical storage for sensitive historical information provides optimal security and efficiency.
fromTNW | Artificial-Intelligence
7 hours ago
Artificial intelligence

Google turns Chrome into an agentic AI workplace tool with Auto Browse, Skills, and enterprise DLP at $6/month

Chrome is evolving into an intelligent workplace platform with autonomous task capabilities and integrated AI features.
#privacy
Privacy professionals
fromSecuritymagazine
1 day ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromComputerWeekly.com
5 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy professionals
fromSecuritymagazine
1 day ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromComputerWeekly.com
5 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Marketing tech
fromComputerworld
1 day ago

Adobe builds an 'agentic content supply chain' for the AI era

Adobe's new tools automate content creation and enhance branding through generative AI and agentic assistants.
Environment
fromwww.dw.com
1 day ago

Why cloud computing still runs on coal and gas

Data centers' energy demands are straining U.S. power grids, leading to reliance on fossil fuels and delaying renewable energy goals.
Data science
fromInfoWorld
1 day ago

Addressing the challenges of unstructured data governance for AI

Enterprises must enhance data governance for unstructured data as AI transforms data management practices.
Tech industry
fromTheregister
2 days ago

HP's remote desktop push retreats as Anyware heads for EoL

HP is discontinuing its Teradici-derived remote desktop business, including HP Anyware and zero client hardware, by May 2026.
Node JS
fromRaymondcamden
6 days ago

Summarizing Docs with Built-in AI

On-device summarization of various document types, including Office formats, is achievable using libraries like officeParser and Chrome's Summary API.
Remote teams
fromComputerworld
5 days ago

AI is finally delivering productivity - for remote employees

The key to productivity with AI lies in the freedom to use it effectively, not just the technology itself.
Information security
fromZDNET
9 hours ago

Google brings Auto Browse and Skills to Chrome Enterprise - and a new 'Gemini Summary'

Chrome Enterprise introduces AI features to automate tasks and enhance IT control over workplace AI tools.
DevOps
fromComputerWeekly.com
2 days ago

Storage implications of a modern IT architecture | Computer Weekly

Organizations are increasingly using containers to modernize applications and manage both cloud-native and traditional workloads with Kubernetes.
Digital life
fromWIRED
5 years ago

7 Apps to Help You Trim Down Subscriptions-and Save Money

Apps can help track and manage recurring subscriptions, ensuring users only pay for what they need.
fromArs Technica
1 day ago

Meta will use employee-tracking software to help train AI agents: Report

Meta's new Model Capability Initiative will track the mouse movements, clicks, and keystrokes of its US employees to generate high-quality training data for future AI agents. This software will operate on specific work-related apps and websites, and will also utilize periodic screenshots to provide context for the AI training.
Artificial intelligence
#microsoft
Information security
fromNextgov.com
10 hours ago

Microsoft to test third-party AI models for incorporation in its security offerings

Microsoft is evaluating third-party AI systems to enhance its cybersecurity measures against AI-driven threats.
Privacy technologies
fromThe Verge
1 week ago

Microsoft faces fresh Windows Recall security concerns

A new tool, TotalRecall Reloaded, extracts data from Microsoft's redesigned Recall feature, raising ongoing security and privacy concerns.
Information security
fromTheregister
5 days ago

Microsoft closes book on rogue Windows Server 2025 upgrades

Microsoft has resolved the Windows Server 2025 upgrade issue, but new problems have emerged with the cumulative update KB5082063.
Information security
fromNextgov.com
10 hours ago

Microsoft to test third-party AI models for incorporation in its security offerings

Microsoft is evaluating third-party AI systems to enhance its cybersecurity measures against AI-driven threats.
Privacy technologies
fromThe Verge
1 week ago

Microsoft faces fresh Windows Recall security concerns

A new tool, TotalRecall Reloaded, extracts data from Microsoft's redesigned Recall feature, raising ongoing security and privacy concerns.
Information security
fromTheregister
5 days ago

Microsoft closes book on rogue Windows Server 2025 upgrades

Microsoft has resolved the Windows Server 2025 upgrade issue, but new problems have emerged with the cumulative update KB5082063.
DevOps
fromInfoQ
1 day ago

Cloudflare Outlines MCP Architecture as Enterprises Confront Security and Governance Risks

Centralized governance and remote infrastructure are essential for secure Model Context Protocol deployments, addressing risks like prompt injection and supply chain attacks.
fromComputerworld
6 days ago

Microsoft Teams cheat sheet: How to get started

Using the Mic button and dropdown, you can select your audio devices, including your speaker volume. In most cases, Teams selects this correctly, but if you want to switch to a Bluetooth or USB headset, for instance, choose the right device from the Speaker and Microphone section of the right pane.
Remote teams
#ai
fromMedium
1 day ago
Artificial intelligence

How to mitigate the risk of AI implementation in enterprise environments

Information security
fromFast Company
17 hours ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
Information security
fromFast Company
17 hours ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
fromSecurityWeek
2 days ago

Half of the 6 Million Internet-Facing FTP Servers Lack Encryption

Approximately 6 million internet-accessible systems are using FTP today, and almost half of them do not use encryption, exposing enterprises and end users to avoidable risks.
Privacy professionals
Information security
fromSecurityWeek
1 day ago

Unsecured Perforce Servers Expose Sensitive Data From Major Orgs

Many internet-facing Perforce P4 servers are misconfigured, exposing sensitive information and allowing unauthorized access.
Software development
fromArs Technica
6 days ago

New Codex features include the ability to use your computer in the background

OpenAI's Codex desktop app update introduces background task capabilities, scheduling, an in-app browser, and image generation features for enhanced productivity.
fromInfoQ
3 days ago

Engineering Stable, Secure and Scalable Platforms: A Conversation with Matthew Liste

I was always a tinkerer, I guess. I grew up in the age where computers were not ubiquitous or common. An experience as a kid was instrumental in how my career happened.
DevOps
Information security
fromSecurityWeek
15 hours ago

Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data

SBOMs and VEX statements fail to enhance software supply chain security due to poor decision-making and inconsistent interpretation of available data.
DevOps
fromwww.bankingdive.com
3 days ago

How proactive DEX strengthens IT compliance in financial services

Proactive DEX management helps financial services organizations address compliance challenges by continuously monitoring and improving the digital workplace.
fromSpeckyboy Design Magazine
2 weeks ago

How To Protect Media Files Uploaded to WordPress - Speckyboy

The predictable file structure of the content management system makes it easy to guess where a file is stored, leading to potential leaks, as demonstrated by a journalist accessing a leaked UK budget document.
Privacy technologies
Information security
fromInfoWorld
1 day ago

The cookbook for safe, powerful agents

Capability without control in AI agents creates vulnerabilities, necessitating a structured control architecture for safe deployment.
DevOps
fromInfoQ
6 days ago

AWS Launches Agent Registry in Preview to Govern AI Agent Sprawl Across Enterprises

AWS Agent Registry provides a centralized catalog for managing AI agents, tools, and skills across organizations, addressing agent sprawl and compliance issues.
Information security
fromSecuritymagazine
3 days ago

58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code

31% of organizations using AI-generated code spend 10 hours or less per month on validation and auditing, raising security concerns.
DevOps
fromComputerWeekly.com
5 days ago

AI, energy, and the new rules of cloud sustainability competition | Computer Weekly

Cloud providers offer sustainability metrics, but lack standardization makes it difficult for enterprises to compare workloads effectively.
DevOps
fromInfoWorld
5 days ago

When cloud giants neglect resilience

Cloud outages highlight reliability issues as providers prioritize cost-cutting over service stability, raising questions about acceptable levels of unreliability.
DevOps
fromInfoWorld
6 days ago

The agent tier: Rethinking runtime architecture for context-driven enterprise workflows

Digital workflows in large enterprises struggle to adapt to contextual variations, leading to increased complexity and challenges in customer onboarding processes.
Remote teams
fromBusiness Matters
1 month ago

Hybrid work continues to drive demand for virtual desktop infrastructure

52% of employees with remote-capable jobs work in hybrid arrangements, prompting organizations to rethink cybersecurity strategies.
#data-security
Remote teams
fromNextgov.com
1 month ago

Consolidation in a complex and aging enterprise IT environment

Federal agencies must pursue strategic IT consolidation to manage aging legacy systems while modernizing, requiring strong leadership, disciplined planning, and change management beyond technological decisions.
#cloud-storage
Business intelligence
fromInfoWorld
1 month ago

Drive business productivity through open collaboration, AI and document creation

Open source office suites like ONLYOFFICE offer businesses flexible, cost-effective alternatives to proprietary software with integrated AI control and seamless enterprise application compatibility.
fromSilicon Canals
2 weeks ago

When militaries share data centers with banks: how Gulf strikes exposed a structural flaw in global cloud infrastructure - Silicon Canals

When civilian banks, logistics platforms, and payment processors share physical data center infrastructure with military AI systems, those facilities become legitimate military targets under international humanitarian law - and the civilian services housed inside lose their legal protection.
Information security
DevOps
fromInfoWorld
3 weeks ago

How to build an enterprise-grade MCP registry

MCP registries are essential for integrating AI agents with enterprise systems, requiring semantic discovery, governance, and developer-friendly controls.
Business intelligence
fromEntrepreneur
1 month ago

The Game-Changing Tech Saving Companies From Data Disasters

Combining Continuous Data Protection with AI capabilities enables businesses to achieve near-zero Recovery Point Objectives and minimal Recovery Time Objectives, preventing data loss and minimizing downtime.
Deliverability
fromBusiness Matters
1 month ago

9 Ways to Split Up Big Documents into Smaller, Shareable Files

Large documents can be efficiently split into smaller, manageable files using online tools and built-in software features without losing formatting or quality.
Information security
fromSecurityWeek
2 weeks ago

Critical ShareFile Flaws Lead to Unauthenticated RCE

Two critical vulnerabilities in ShareFile could allow unauthenticated remote code execution through improper access to configuration pages.
Web development
fromCmsreport
2 months ago

Preserving CMS Report: Why We Are Transitioning to a Permanent Archive

CMS Report will be transitioned into a permanent archive: no new content or updates will be published while existing material remains online and accessible.
#digital-asset-management
fromThe Drum
2 months ago
Marketing tech

Where 'digital assets go to die' - signs that you might need a next gen DAM system

fromThe Drum
2 months ago
Marketing tech

Where 'digital assets go to die' - signs that you might need a next gen DAM system

fromEntrepreneur
2 months ago

Convert, Edit and Protect Your Business Documents for Just $30

The average office worker spends approximately 50% of their time managing documents rather than creating value for their business, research from Adobe says. If you're running a company that handles contracts, proposals, or client documentation, eliminate document conversion headaches with a lifetime PDF tool that processes files in seconds while preserving original formatting. PDF Converter & Editor is currently available to new users for just $29.99.
Productivity
fromDbmaestro
5 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
fromTechzine Global
2 months ago

4 steps to create a future-proof data infrastructure

A future-proof IT infrastructure is often positioned as a universal solution that can withstand any change. However, such a solution does not exist. Nevertheless, future-proofing is an important concept for IT leaders navigating continuous technological developments and security risks, all while ensuring that daily business operations continue. The challenge is finding a balance between reactive problem solving and proactive planning, because overlooking a change can cost your organization. So, how do you successfully prepare for the future without that one-size-fits-all solution?
Tech industry
Information security
fromTNW | Offers
4 weeks ago

Team password manager costs $1.50 & just added the features businesses actually need

Stolen credentials are a major security risk; using a password manager like Passpack can mitigate this threat effectively.
fromMedium
1 month ago

Mastering Azure Governance: Why It Matters and How to Get Started

Azure Governance is the set of policies, processes, and technical controls that ensure your Azure environment is secure, compliant, and well-managed. It provides a structured approach to organizing subscriptions, resources, and management groups, while defining standards for naming, tagging, security, and operational practices.
DevOps
fromTheregister
2 months ago

Microsoft sets Copilot agents loose on your OneDrive files

Microsoft has made OneDrive agents generally available, allowing users to query multiple documents simultaneously through Copilot instead of just one at a time. Users can select up to 20 files and create an agent, saved as a .agent file in OneDrive. Rather than teasing information out of individual documents, Microsoft says users can make cross-document queries, including "What decisions have we made so far?" and "What risks keep coming up?" The agent then generates a response based on the documents' content.
Tech industry
Artificial intelligence
fromComputerWeekly.com
1 month ago

Microsoft Cowork: One data store for all your M365 assets | Computer Weekly

Microsoft launches Cowork, an AI tool combining Anthropic's agentic model with Microsoft 365 in a new E7 subscription tier priced at $99 per user, featuring Work IQ context engine for enterprise data access.
DevOps
fromInfoWorld
1 month ago

Cloud-based LLMs risk enterprise stability

Enterprises must return to architectural resilience principles when adopting cloud-hosted LLMs to mitigate risks from increasingly common outages that cause widespread business disruption.
fromEntrepreneur
2 months ago

Here's a Simple Way to Take Control of PDFs at Work

Stop struggling with PDFs and wasting precious minutes of your workday. PDF Agile is ready to help you make peace with these files, serving as an all-in-one PDF tool. You can edit, convert, view, and more, all in one spot, and this lifetime subscription lets you take advantage of this tool forever. Need to fill out a PDF? No problem with PDF Agile. You can also mark up the text with commenting tools, annotate with highlights, underlines, strikethroughs, and more.
Software development
Information security
fromComputerWeekly.com
1 month ago

Beyond integration theatre: Building stronger cyber platforms | Computer Weekly

Integration layers between security platforms, not the platforms themselves, have become the primary enterprise security risk requiring rigorous governance of delegated trust.
#brotli
Artificial intelligence
fromMedium
2 months ago

Extracting AI-Ready Data From Organizational Documents

Poor document extraction corrupts retrieval; preserving document structure at ingestion produces reliable embeddings and trustworthy RAG outputs.
Information security
fromTechzine Global
1 month ago

1Password Launches Unified Access Pro for AI Agents

1Password launches Unified Access Pro to manage credentials for people, AI agents, and machine identities with device-level visibility and just-in-time credential delivery.
Information security
fromThe Hacker News
1 month ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
fromInfoQ
2 months ago

How Dropbox Built a Scalable Context Engine for Enterprise Knowledge Search

Dropbox engineers have detailed how the organization was able to build the context engine behind Dropbox Dash, demonstrating a shift towards index-based retrieval, knowledge graph-derived context, and continuous evaluation to support enterprise AI knowledge retrieval at scale. The design points to a broader pattern emerging across enterprise assistants, whereby teams are deliberately constraining their live tool usage and instead relying more heavily on pre-processed, permission-aware context to speed latency, improve quality and ease token pressure.
Artificial intelligence
Information security
fromComputerworld
1 month ago

Storage vendor offers a real guarantee - but check out those fine-print exceptions

Tech vendors frequently offer performance guarantees with substantial financial penalties, but hidden exceptions in EULAs often make claims difficult or impossible to collect.
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
Information security
fromThe Hacker News
2 months ago

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

Vendors released critical security patches across Microsoft, Adobe, SAP, and Intel TDX, addressing actively exploited zero-days, code-injection, authorization flaws, and multiple other vulnerabilities.
Information security
fromComputerWeekly.com
2 months ago

The world's default productivity tool is becoming a national security liability | Computer Weekly

Dependence on a default productivity platform concentrates systemic risk as state-backed groups like APT28 rapidly weaponize Office vulnerabilities, turning spreadsheets into tools of cyber warfare.
[ Load more ]