Most advanced F-15 variant takes to the air for the first time

The most advanced version of the F-15 multi-role jet fighter has made its maiden flight. The F-15QA being developed for the Qatar Emiri Air Force took off from Lambert International Airport in St. Louis on April 13 for a 90-minute flight.

Source of Article

Continue ReadingMost advanced F-15 variant takes to the air for the first time

Internet and Email Usage policy

Internet and email communications are essential for performing modern business tasks, but companies must put rules in place to reduce the risks that come along with those technologies. This policy offers guidelines to help ensure that both IT and users follow safe practices when using electronic communications such as messaging services, social media, and email tools.

From the policy:

Summary
Internet use in the course of conducting business is a foregone conclusion. For most industries, lacking access is an encumbrance, at best, to getting things done. However, significant risk accompanies internet access—viruses, ransomware, and data theft can result from unsafe practices, though infection can occur just from connecting an unsecured system to the network. Likewise, insider threats—such as the improper access or transfer of data—are important considerations when analyzing your security strategy.

Purpose
This policy sets forth guidelines for the use of the internet, as well as internet-powered communication services, including email, proprietary group messaging services (e.g., Slack), and social networking services (e.g., Facebook, Twitter) in business contexts. It also covers Internet of Things (IoT) use, and bring-your-own-device (BYOD) practices.

You can customize this policy as needed to fit the requirements of your organization.

Generally, this policy assumes that:

  • Your organization permits personal internet use by employees, within reason.
  • Your organization uses internet content/security filtering software.
  • Backups, including compliance-related data retention, is automated by software.

Source of article

Continue ReadingInternet and Email Usage policy

Hiring Kit: Robotics Engineer

Finding the right person to fill the role of robotics engineer can be tricky because of the combination of skills required. This kit includes a detailed job description, sample interview questions, and basic want ad to simplify the task.

From the job description:

Introduction
For many industries and enterprises, manufacturing of any kind is dependent on robotics in some capacity. Automation and the efficiency it brings to the manufacturing process is the technology that can ultimately make or break an enterprise.

Qualified engineers are required to develop, test, and maintain these robotic machines. Finding the right engineer, with the right experience and qualifications, takes effort, determination, and a detailed description of the job at hand. This sample job description for a robotics engineer will help you form a foundation for your enterprise’s next candidate search.

A robotics engineer designs the plans needed to build robots, codes the processes necessary for the robot to run correctly, and develops the procedures the robot will execute once it is built. Sometimes the robotics engineer will also be tasked with designing and building the machines that actually assemble the robots. Only after the design phase has been completed does the engineer move toward assembling the unit. This means a robotics engineer must be a creative designer, a programmer, and a precise engineer—a rare combination of talents.

The position
The company is seeking a self-motivated individual with creative skills in design as well as impeccable skills in precision engineering and programming. The successful candidate will exhibit passion and enthusiasm about engineering, robotics, programming, and the creative process. Candidates will have qualifications, certifications, and experience commensurate with the open position.

Source of article

Continue ReadingHiring Kit: Robotics Engineer

Computer Equipment Disposal policy

Computers, laptops, servers, and other IT equipment are regularly replaced and decommissioned. Off-lease systems must be returned to the manufacturer, some equipment is recycled, and other systems are given to employees or donated. Systems must be properly processed, and sensitive, proprietary, and all other organization information must be properly removed prior to discarding the systems.

The Computer Equipment Disposal policy from TechRepublic Premium presents the organization’s policies and procedures for properly disposing, discarding, and decommissioning computer and IT equipment.The policy also specifies which staff members are responsible for which tasks in the equipment decommissioning process.

Source of article

Continue ReadingComputer Equipment Disposal policy

Tarantula venom finds use in non-opioid pain relief drug

Opioid pain relievers not only produce potential side effects such as nausea and constipation, but they can also be highly addictive. Australian scientists have therefore created what could be a better medication, that is made using tarantula venom.

Source of Article

Continue ReadingTarantula venom finds use in non-opioid pain relief drug

Ultralight Nitecore carbon fiber charger keeps trail runners charged

Known for small, powerful lighting solutions, Nitecore turns attention to a different breed of ultralight gadget. The small, lightweight NB10000 carbon fiber charger keeps iPhones powered through 100-mile ultramarathons.

Source of Article

Continue ReadingUltralight Nitecore carbon fiber charger keeps trail runners charged

Quick-release bike tech keeps thieves from stealing saddles

Even when a thief can't steal a complete bike, they'll still pilfer parts off of it – and that includes the saddle. That's where the Quick Release Seatpost comes in, as it allows riders to quickly remove and replace the saddle themselves.

Source of Article

Continue ReadingQuick-release bike tech keeps thieves from stealing saddles

Coronavirus: Critical IT policies and tools every business needs

Due to the coronavirus, your company might need to create, revise, or implement policies for remote work, travel, business continuity, and disaster recovery. Download these helpful resources. The coronavirus (COVID-19)…

Continue ReadingCoronavirus: Critical IT policies and tools every business needs