practices
-
Blog
5 Best Practices for Setting Up a Smooth IVR Phone Tree
An interactive voice response (IVR) system provides an automated phone menu for callers to interact with instead of a live agent. They present a tree of options for customers to serve themselves, thus giving businesses an efficient and cost-effective way to route calls and solve certain issues. For callers, an IVR can reduce wait times and deliver a better customer…
Read More » -
Blog
Scale AI under fire in suit filed by former worker alleging unlawful business practices – Computerworld
Moreover, the subject matter of many prompts, some of which involved suicidal ideation and violence, among other disturbing topics, coupled with restrictions from Scale AI around break times and outside research, created a grueling, authoritarian workplace in which workers could be terminated for complaining about working conditions, payments, or company processes, the complaint said. Additionally, the suit says that McKinney…
Read More » -
Blog
The open source community relies on a loyal army of committed developers – but their security practices are putting the whole ecosystem at risk
Insufficient security on individual developer accounts maintaining some of the most popular packages poses a significant threat to the open source community and beyond, according to a report from the Linux Foundation. The Linux Foundation Census is the third report of its kind looking into the widespread use of free and open source software (FOSS), aggregating data from over 12…
Read More » -
Blog
Canada sues Google over alleged anticompetitive practices in online advertising – Computerworld
A global spotlight on Google’s practices Earlier this month the US DOJ has recommended extensive measures to limit Google’s dominance, including the potential breakup of its Chrome browser and Android operating system. These products are pivotal distribution platforms for Google Search, which was deemed an illegal monopoly in Federal Judge Amit Mehta’s August ruling. These cases collectively highlight the increasing…
Read More » -
Blog
FTC opens antitrust investigation into Microsoft’s cloud, AI, and cybersecurity practices – Computerworld
Focus on market dominance and security practices The investigation centers on Microsoft’s bundling of office productivity and security software with its cloud services, a practice critics argue disadvantages competitors in the authentication and cybersecurity markets. The FTC is particularly examining Microsoft Entra ID, its user authentication service, amid complaints that licensing terms and integration with its cloud offerings impede rival…
Read More » -
Blog
FTC eyes Microsoft’s cloud practices amid anti-trust scrutiny – Computerworld
If pursued, this inquiry could lead to intensified regulations on Microsoft’s cloud strategy, underscoring the FTC’s commitment to protecting competitive markets in sectors increasingly dominated by a few key players. Neither the FTC nor Microsoft has publicly commented on the matter. “Moving forward, all hyperscalers should commit to the interoperability of their cloud solutions in both intent and practice,” Jain…
Read More » -
Blog
Apple’s Geo-Blocking Practices Could Violate EU Rules
The European Commission has informed Apple that its geo-blocking practices, where services are limited or blocked in certain geographical locations, are potentially breaking the law. These practices have been identified on the App Store, Apple Arcade, Music, iTunes Store, Books, and Podcasts. The Commission, along with the Consumer Protection Cooperation Network, has three main issues relating to Apple’s geo-blocking, which…
Read More » -
Blog
Feeling safe with that complicated password? Think again, security experts say – complexity affects memorability and fosters unsafe practices
Overly complex passwords are not just ineffective but dangerously insecure, according to the latest National Institute of Standards and Technology (NIST) guidelines. Humans often choose easily guessed passwords for the sake of memorability, NIST said, meaning many online services have introduced rules that demand a certain level of complexity. For example, many services require users to create passwords that contain…
Read More » -
Blog
8 Simple Call Center Best Practices That Require $0 Spend
If you have ever worked in a call center, then you know following best practices is really hard. For many teams, especially those with high turnover, just getting through the day is difficult enough. So I’m not blogging from an ivory tower acting like it’s easy to maintain call center best practices — it’s not — it requires dedicated managers…
Read More » -
Blog
Secure Workspace for Remote Work Best Practices & Tools 2024
Creating a secure workspace for remote work involves more than just providing employees with the tools they need to perform their jobs. It requires a well-thought-out approach to security, data protection, compliance, and productivity. Here’s an expanded guide on how to build a secure and efficient remote workspace, without focusing on specific products but on best practices, technologies, and strategies.…
Read More »