Month: August 2024

‘Exploitative’ IT Firm Has Been Delaying 2,000 Recruits’ Onboarding For Years

An anonymous reader shares a report: Indian IT firm Infosys has been accused of being “exploitative” after allegedly sending job offers to thousands of engineering graduates but still not onboarding any of them after as long as two years. The recent graduates have reportedly been told they must do repeated unpaid training in order to remain eligible to work at Infosys. Last week, the Nascent Information Technology Employees Senate (NITES), an Indian advocacy group for IT workers, sent a letter, shared by The Register, to Mansukh Mandaviya, India’s minister of Labor and Employment. It requested that the Indian government intervene “to prevent exploitation of young IT graduates by Infosys.”

The letter, signed by NITES president Harpreet Singh Saluja, claimed that NITES received “multiple” complaints from recent engineering graduates “who have been subjected to unprofessional and exploitative practices” from Infosys after being hired for system engineer and digital specialist engineer roles. According to NITES, Infosys sent these people offer letters as early as April 22, 2022, after engaging in a college recruitment effort from 2022â”2023, but never onboarded the graduates. NITES has previously said that “over 2,000 recruits” are affected.

Read more of this story at Slashdot.

An anonymous reader shares a report: Indian IT firm Infosys has been accused of being “exploitative” after allegedly sending job offers to thousands of engineering graduates but still not onboarding any of them after as long as two years. The recent graduates have reportedly been told they must do repeated unpaid training in order to remain eligible to work at Infosys. Last week, the Nascent Information Technology Employees Senate (NITES), an Indian advocacy group for IT workers, sent a letter, shared by The Register, to Mansukh Mandaviya, India’s minister of Labor and Employment. It requested that the Indian government intervene “to prevent exploitation of young IT graduates by Infosys.”

The letter, signed by NITES president Harpreet Singh Saluja, claimed that NITES received “multiple” complaints from recent engineering graduates “who have been subjected to unprofessional and exploitative practices” from Infosys after being hired for system engineer and digital specialist engineer roles. According to NITES, Infosys sent these people offer letters as early as April 22, 2022, after engaging in a college recruitment effort from 2022â”2023, but never onboarded the graduates. NITES has previously said that “over 2,000 recruits” are affected.

Read more of this story at Slashdot.

Read More 

As The Rings of Power season 2 leans heavily into The Lord of the Rings lore, its creators say it’s ‘not a response’ to fan ire over season 1

The Rings of Power’s showrunners have defended the non-canonical events depicted in the hit Prime Video series’ first season.

One of The Rings of Power‘s showrunners has insisted that season 2’s closer ties to its source material “is not any kind of response” to fan frustrations with the first season.

Speaking to TechRadar ahead of The Rings of Power season 2‘s release, Patrick McKay stressed that he and co-creator J.D. Payne didn’t decide to lean more heavily into J.R.R. Tolkien’s beloved works following criticism from sections of the author’s fanbase. Instead, McKay maintained that “it was always the plan” for The Rings of Power season 1 to be less faithful to The Lord of the Rings books, appendices, and legendarium before they fully committed to canonical events in later seasons.

McKay’s response comes almost two years after the hit Prime Video show’s first season launched. While the high-fantasy series was a runaway success for Amazon MGM Studios – it’s the most-streamed Prime Video TV Original of all time – the prequel project was slammed by legions of diehard Tolkienities. Indeed, The Rings of Power‘s sparkling success couldn’t save it from some baffling and horrific fan backlash that not only chastized McKay and Payne’s take on the source material, but also led to racially-aggravated verbal attacks towards its black cast members.

Season 2 will depict the Siege of Eregion in all of its epic and brutal glory (Image credit: Ross Ferguson/Prime Video)

In the time between between its first two seasons, we learned that season 2 would forge closer ties to The Lord of the Rings‘ books and their supporting texts. Indeed, the arrival of The Rings of Power 2‘s first trailer suggested its creators had learned lessons from the first season, not least in their attempts to religiously adapt what Tolkien had written about Middle-earth’s Second Age.

Of course, as the first teaser and its follow-up trailers revealed, there would be plenty more original content that Payne, McKay, and the show’s other writers had devised. However, those at the helm of one of the best Prime Video shows were clearly ready to fully embrace events in Tolkien’s literary works, and bring them to life on the small screen as dutifully as possible.

What made McKay and Payne wait an entire season to deliver on that promise, though? Why didn’t they just dive headfirst into the written material and adapt it verbatim from the get-go? And did the fan ire force them to change tack from a storytelling approach?

Merry #TheRingsOfPower season 2 Eve! To celebrate, here are some more gold carpet moments from its world premiere – starting with @bearmccreary and the inspiration he took from Tolkien’s works for this season’s vocal-led songs: pic.twitter.com/dViTk8EbkgAugust 28, 2024

“We set upon this journey with a plan,” McKay told me. “That plan was for a multi-season arc that would start in a place that welcomes audiences back to Middle-earth and introduces all of these characters. Some are canonical characters in a much earlier phase of development where they might look different to what you’d expect, and some are new characters, hopefully created in Tolkienian fashion that use the hints in the text as a springboard. That first season would then lead you into the Second Age before kicking you into what are now seasons built around canonical tentpole moments.

“So, really, it’s not any kind of response [to the backlash], or us learning anything from last season. It was always the plan to have a big season one that invites everyone in and, now they’re immersed in our world, they’re in this universe of major historical, mythical, canon events that we aim to build whole worlds around.”

That blueprint, although divisive among The Lord of the Rings‘ fanbase, is certainly taking shape now. In my review of The Rings of Power season 2’s first three episodes, I called it a “darker and more dangerous installment that’s far more faithful to its literary inspiration”, and added that it continues to be a “well-oiled, character-driven slice of prestige TV”. Here’s hoping the rest of this season lives up to the lofty expectations I’ve set for myself and others.

You might also like

‘We looked at it’: The Rings of Power season 2 pays tribute to The Fellowship of the Ring movie in the most precise way possible, its creators confirm‘It helped me enormously’: The Rings of Power‘s Celebrimbor actor had a ‘forensic’ crash course in ring-making to upgrade their character in season 2‘We’re working on it’: The Rings of Power season 3 hasn’t been confirmed yet, but the Prime Video show’s creators have an update on its development

Read More 

Pylon lands $17M investment to build a full service B2B customer service platform

Marty Kausas, Pylon’s CEO and co-founder, says they quickly learned that the omnichannel approach the company originally took was just a first step, and customers were clamoring for more.
© 2024 TechCrunch. All rights reserved. For personal use only.

Marty Kausas, Pylon’s CEO and co-founder, says they quickly learned that the omnichannel approach the company originally took was just a first step, and customers were clamoring for more.

© 2024 TechCrunch. All rights reserved. For personal use only.

Read More 

This app makes it easier for neurodivergent people to navigate daily tasks

Copenhagen-based Tiimo has raised an additional $1.6mn in funding to expand its app supporting neurodivergent individuals in their daily life. Neurodivergent individuals — those with autism, ADHD, dyslexia, and other cognitive differences — make up about 15% to 20% the population. However, tailored tools to boost productivity and daily life management for people who think differently are still insufficient. Tiimo is on a mission to change this. Behind the startup are Helene Lassen Nørlem and Melissa Würtz Azari, who herself has ADHD. The female duo founded the company in 2015 with the aim of developing a neurodivergent tool kit. Tiimo…This story continues at The Next Web

Copenhagen-based Tiimo has raised an additional $1.6mn in funding to expand its app supporting neurodivergent individuals in their daily life. Neurodivergent individuals — those with autism, ADHD, dyslexia, and other cognitive differences — make up about 15% to 20% the population. However, tailored tools to boost productivity and daily life management for people who think differently are still insufficient. Tiimo is on a mission to change this. Behind the startup are Helene Lassen Nørlem and Melissa Würtz Azari, who herself has ADHD. The female duo founded the company in 2015 with the aim of developing a neurodivergent tool kit. Tiimo…

This story continues at The Next Web

Read More 

See Savings of Up to 40% Off During GlassesUSA’s Labor Day Sale

GlassesUSA is offering savings of up to 40% off during its Labor Day sale. We’ll explain everything you need to know so you can save.

GlassesUSA is offering savings of up to 40% off during its Labor Day sale. We’ll explain everything you need to know so you can save.

Read More 

Anker Labor Day deals including this 10K magnetic power bank for only $30

Just because summer is ending (yes, I will admit it) doesn’t mean that the day trips or weekend getaways must stop. If you spent the whole season desperately looking for an outlet, then maybe reward yourself this fall with a power bank? Right now, a few of Anker’s best portable chargers are on sale, including the 334 Magnetic Power Bank. The wireless portable charger is down to an all-time low price of $30 from $40 — a 25 percent discount. 
Anker’s 334 Magnetic Power Bank provides a 7.5W charge without any need for a wire. I don’t have this one, but I do have another Anker power bank, and being able to connect without worrying about a cord is a game changer. Worth noting: this accessory is solely for iPhone users and is compatible with the iPhone 12 and above. Plus, you can charge the accessory and your iPhone at the same time if you’re only traveling with one plug. 

If you’re looking for a power bank with more, well, power then check out some of the other deals on Anker accessories. Anker’s Qi2 Certified 15W MagGo Power Bank is down to $70 from $90 — a 22 percent discount. The accessory is one of our top picks for 2024’s best power banks and portable chargers thanks to features like its fast charging speeds, sturdy kickstand and clear battery percentage indicator. It’s compatible with the iPhone 12 and higher, giving you a full charge and about two-thirds of the way to another. 
The other option to consider is Anker’s 200W Prime Power Bank with three ports and a 100W charging case. It’s available for $150, down from $185, and has two USB-C ports and one USB-A port. A clear front display also states how much charge is left (or how long until the power bank is back to 100 percent). It works with laptops and smartphones and can charge two computers at once with 100W each. 
Follow @EngadgetDeals on Twitter and subscribe to the Engadget Deals newsletter for the latest tech deals and buying advice.This article originally appeared on Engadget at https://www.engadget.com/deals/anker-labor-day-deals-including-this-10k-magnetic-power-bank-for-only-30-135615179.html?src=rss

Just because summer is ending (yes, I will admit it) doesn’t mean that the day trips or weekend getaways must stop. If you spent the whole season desperately looking for an outlet, then maybe reward yourself this fall with a power bank? Right now, a few of Anker’s best portable chargers are on sale, including the 334 Magnetic Power Bank. The wireless portable charger is down to an all-time low price of $30 from $40 — a 25 percent discount. 

Anker’s 334 Magnetic Power Bank provides a 7.5W charge without any need for a wire. I don’t have this one, but I do have another Anker power bank, and being able to connect without worrying about a cord is a game changer. Worth noting: this accessory is solely for iPhone users and is compatible with the iPhone 12 and above. Plus, you can charge the accessory and your iPhone at the same time if you’re only traveling with one plug. 

If you’re looking for a power bank with more, well, power then check out some of the other deals on Anker accessories. Anker’s Qi2 Certified 15W MagGo Power Bank is down to $70 from $90 — a 22 percent discount. The accessory is one of our top picks for 2024’s best power banks and portable chargers thanks to features like its fast charging speeds, sturdy kickstand and clear battery percentage indicator. It’s compatible with the iPhone 12 and higher, giving you a full charge and about two-thirds of the way to another. 

The other option to consider is Anker’s 200W Prime Power Bank with three ports and a 100W charging case. It’s available for $150, down from $185, and has two USB-C ports and one USB-A port. A clear front display also states how much charge is left (or how long until the power bank is back to 100 percent). It works with laptops and smartphones and can charge two computers at once with 100W each. 

Follow @EngadgetDeals on Twitter and subscribe to the Engadget Deals newsletter for the latest tech deals and buying advice.

This article originally appeared on Engadget at https://www.engadget.com/deals/anker-labor-day-deals-including-this-10k-magnetic-power-bank-for-only-30-135615179.html?src=rss

Read More 

Data spills and shadow data: How exposed are you to the risks?

The larger an organization is, the more ‘shadow data’ it often has, and the harder it seems to be to keep track of all the different places data is stored.

Fujitsu made the news earlier this year after accidentally exposing AWS keys, plaintext passwords, and client data. The incident caused serious concern when it became clear that the exposed data had been floating about the internet for almost 12 months.

This type of unintentional lapse in data control is more common than you might think. Larger organizations, in particular, tend to have more shadow data than they would like to admit to, and can often find it harder to keep tabs on all the places where their data is stored, be that a stray code repository or some cloud storage being used to transfer data between non-corporate systems.

Enterprises falling foul of these data spills can face serious consequences, with the immediate fallout often including reputational damage and loss of customer trust, as well as difficult questions from investors, stakeholders, and journalists.

Fallout aside, the impact of these exposures is just as worrying. It can provide cybercriminals with access to highly confidential or proprietary data, which they can then use to commit fraud or disrupt operations.

With the added possibility of lawsuits, regulatory fines, and financial losses, no company can afford to ignore data and cybersecurity. Yet many incident response teams (including ours) are all too familiar with cases like this – and they remind us that seemingly straightforward preventative measures are more complex to apply across larger organizations.

So, what are some common pitfalls, and how can your business avoid them?

Always know where your data is

This might seem straightforward (and obvious), but all too often we encounter situations where restrictions on where data can and can’t go, and guidelines on what data can be added to publicly accessible sources, are either overlooked in project discussions or processes, or, in some cases, not documented at all. This lack of clarity leaves individuals to decide for themselves what is acceptable, leading to potential security risks.

Our incident response teams have dealt with several cases where developers have used unauthorized or undocumented public-facing storage and repositories. Even when a repository is known and approved for use within the organization, it’s crucial to clearly define what is allowed to be stored there. Guidelines on what needs to be removed from a codebase before pushing it to a public repo should be well-defined and regularly enforced. Not doing so can create significant unmanaged risk. No matter how strong your cybersecurity defenses are, you can’t protect data if you don’t know it exists.

Addressing storage-related governance and providing clear project documentation that defines parameters for what can/cannot be stored publicly will always help, as will compulsory staff training for all employees. Layered on top of that, threat intelligence and DLP scanning services can also be used to good effect to monitor and search for evidence of public exposures both in public locations as well as your own known storage locations – these are well worth monitoring and reporting on long term.

Code repositories

I’ve lost track of how many incidents we’ve dealt with recently where a breach was caused by the public exposure of sensitive data. Several of these breaches occurred due to sensitive information being stored in publicly accessible GitHub repositories or Amazon S3 buckets.

Frequently, these stored resources contained hard-coded materials like AWS administrative keys for user accounts and user credentials. In some cases, they even included static API keys for public services that hold sensitive financial information; it’s practically like signposting a target for attack and giving the attacker the keys to the door.

Using repositories has long been standard practice for developers, making it essential for enterprises to continuously review their security protocols. It’s not just about expecting developers to avoid mistakes – it’s about ensuring there are clear rules and automated checks in place to help prevent mistakes as well.

For instance, GitHub offers tools for secret scanning and advanced security features that can help detect and prevent sensitive data from being exposed in your codebase. By implementing these kinds of safeguards, you reduce the risk of sensitive information, such as API keys, being inadvertently published. Without these checks, even the most well-intentioned developers may unintentionally compromise security.

Keep it private

I’m not suggesting that GitHub or other code repositories are bad – far from it (they have saved my sanity far too many times for me to brand them as such!). But staying secure means organizations should endeavor to conceal their code until it’s safe to do otherwise.

With that in mind, privacy should always be the default stance until appropriate checks have been run on everything that’s being stored. And if you intend to publish publicly, make sure you complete pre- and post-publication repository checks first.

Make reporting easy

Specialist researchers and bug bounty hunters can provide valuable insights (even if you have not directly employed them), so long as you give them a clearly signposted route to tell you about anything they discover. In Fujitsu’s case, Jelle Ursem, a Netherlands-based security researcher, had tried to contact the company but found he could not easily reach the right person.

Preventing a similar situation is relatively simple: Set up a contact form on your website or use a dedicated monitored inbox to handle discoveries. You could even introduce a bug bounty program to reward ethical hackers and the wider research community for discovering and reporting vulnerabilities to you.

Either way, the key is to have a structured method for working with others to enable the reporting issues, because let’s face it – it’s always preferable to finding out after a breach. By that point it’s usually far too late, and the costly damage has already been done.

The reality is that the larger and more complex your organisation, the more data it will have. Unfortunately, this makes it more likely that information will be accidentally exposed. But as with many things, planning, education, and transparent policies, as well as the use of appropriate tools for checking against human error, will help minimize the risk.

We’ve featured the best encryption software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Read More 

Scroll to top
Generated by Feedzy