HR provider’s 1150% growth over the last 4 years recognised with prestigious accolade
Global cloud HRMS provider Fairsail has been named as one of the UK’s fastest growing technology companies for the second consecutive year. The Reading-based company placed 15th in the Deloitte 2015 UK Technology Fast 50, one of the UK’s most prestigious technology awards.
The Deloitte 2015 UK Technology Fast 50, now in its 18th year, celebrates innovation and entrepreneurship across all technology sectors, and is awarded on the basis of revenue growth. Fairsail won its place on the list in recognition of its rapid expansion, growing 1150% over the last four years, and quadrupling its staff in the last two.
Fairsail’s HRMS (HR management system) has had enormous success in helping small to mid-sized organisations transform the acquisition, engagement, management and development of their workforces. As well as adding a series of high profile clients to its customer portfolio over the last twelve months, Fairsail has risen to become the number one HR app on the industry-leading Salesforce.com platform, and is one of their top three Independent Software Vendors (ISV) in the EMEA market.
“Fairsail has worked hard throughout 2015 to build on its reputation as a truly disruptive force in the global cloud HR market, emerging as a clear winner against other larger vendors because of our comprehensive functionality and our niche understanding of global mid-size organisations,” said Adam Hale, CEO at Fairsail. “We are delighted to be part of the Deloitte Fast 50 for the second year in a row. The past 12 months have been fantastic for the Fairsail brand and our global team, and across the company it’s a great recognition of our collective achievements to have been placed once again.”
The award is the third of its kind in recent months for Fairsail, which has also been named as one of Aragon Research’s “Hot Vendors”, and been highly commended in the Cloud Provider of the Year category at Computing’s UK IT Awards.
“We’re delighted to be supporting businesses with an intuitive HR solution that is proactively helping mid-size businesses to have superb workforce visibility, hugely increased HR productivity and to deliver world class workforce experiences,” said Hale.
Fairsail placed at number 15 in the Fast 50 – a rise of 24 points from number 39 in last year’s list. They were also ranked the second fastest growing company in the South East. Others named in the Fast 50 were Fairsail customer Skyscanner and partner Kimble, also a part of the Sage Live and Salesforce ecosystem.
“Being part of the Fast 50 is a tribute not only to the team we have at Fairsail, but also our growing client list,” said Hale. “We’d also like to extend our congratulations to all other firms who have joined the Fast 50 this year – we’re in great company.”
Fairsail enables mid-size, multinational companies to manage modern workforces through its global cloud HRMS, transforming how organizations acquire, engage, manage and develop their people. Implemented quickly and simple to use, the award winning system increases company productivity, reduces operational costs and provides better experiences across the entire workforce. Fairsail’s customer portfolio includes Aveva, Betfair/TVG, Cobalt International Energy, Huddle, Mitsubishi UFG, SDL, Skyscanner, SolarWinds and Zipcar.
Learn more about Fairsail on the website.
Join the Fairsail Regatta HR leaders group.
Why do online shoppers have to take special precautions?
The Internet offers convenience not available from other shopping outlets. From the comfort of your home, you can search for items from multiple vendors, compare prices with a few mouse clicks, and make purchases without waiting in line. However, the Internet is also convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers. Attackers who are able to obtain this information may use it for their own financial gain, either by making purchases themselves or by selling the information to someone else.
How do attackers target online shoppers?
There are three common ways that attackers can take advantage of online shoppers:
- Creating fraudulent sites and email messages – Unlike traditional shopping, where you know that a store is actually the store it claims to be, attackers can create malicious websites or email messages that appear to be legitimate. Attackers may also misrepresent themselves as charities, especially after natural disasters or during holiday seasons. Attackers create these malicious sites and email messages to try to convince you to supply personal and financial information.
- Intercepting insecure transactions – If a vendor does not use encryption, an attacker may be able to intercept your information as it is transmitted.
- Targeting vulnerable computers – If you do not take steps to protect your computer from viruses or other malicious code, an attacker may be able to gain access to your computer and all of the information on it. It is also important for vendors to protect their computers to prevent attackers from accessing customer databases.
How can you protect yourself?
- Do business with reputable vendors – Before providing any personal or financial information, make sure that you are interacting with a reputable, established vendor. Some attackers may try to trick you by creating malicious websites that appear to be legitimate, so you should verify the legitimacy before supplying any information. (See Avoiding Social Engineering and Phishing Attacks and Understanding Web Site Certificates for more information.) Attackers may obtain a site certificate for a malicious website to appear more authentic, so review the certificate information, particularly the "issued to" information. Locate and note phone numbers and physical addresses of vendors in case there is a problem with your transaction or your bill.
- Make sure your information is being encrypted – Many sites use secure sockets layer (SSL) to encrypt information. Indications that your information will be encrypted include a URL that begins with "https:" instead of "http:" and a padlock icon. If the padlock is closed, the information is encrypted. The location of the icon varies by browser; for example, it may be to the right of the address bar or at the bottom of the window. Some attackers try to trick users by adding a fake padlock icon, so make sure that the icon is in the appropriate location for your browser.
- Be wary of emails requesting information – Attackers may attempt to gather information by sending emails requesting that you confirm purchase or account information. (See Avoiding Social Engineering and Phishing Attacks.) Legitimate businesses will not solicit this type of information through email. Do not provide sensitive information through email. If you receive an unsolicited email from a business, instead of clicking on the provided link, directly log on to the authentic website by typing the address yourself. (See Recognizing and Avoiding Email Scams.)
- Use a credit card – There are laws to limit your liability for fraudulent credit card charges, but you may not have the same level of protection for your debit cards. Additionally, because a debit card draws money directly from your bank account, unauthorized charges could leave you with insufficient funds to pay other bills. You can minimize potential damage by using a single, low-limit credit card to making all of your online purchases. Also use a credit card when using a payment gateway such as PayPal, Google Wallet, or Apple Pay.
- Check your shopping app settings – Look for apps that tell you what they do with your data and how they keep it secure. Keep in mind that there is no legal limit on your liability with money stored in a shopping app (or on a gift card). Unless otherwise stated under the terms of service, you are responsible for all charges made through your shopping app.
- Check your statements – Keep a record of your purchases and copies of confirmation pages, and compare them to your bank statements. If there is a discrepancy, report it immediately. (See Preventing and Responding to Identity Theft.)
Iron Mountain Incorporated has published the results of a recent research survey with IDG Research Services to understand the level of risk associated with Software-as-a-Service (SaaS) in the enterprise, the importance of contingency planning, and the consequences experienced when a SaaS vendor does not meet expectations for application support.
Often, small SaaS providers can’t answer the question “What if your servers go down?” much less the bigger question, “What if you close your doors, how do I continue operations and get my data?” SaaS providers need to earn the trust of their customers by ensuring that an application continuity plan is in place.
The survey targeted management-level employees at enterprises employing 1,000 or more people to gain their insight.
Key findings from the research include:
- SaaS has risen to 25 percent of the average applications portfolio (as compared to 11 percent in 2008);
- Half of respondents think that risks associated with SaaS are greater than those of traditional on-premises software;
- 73 percent of enterprises surveyed say it’s ‘very important’ or ‘critical’ that a SaaS provider allow continued access to applications and data, even if the provider goes out of business.
The survey report recommends that users of SaaS applications ensure that they have a business continuity plan in place that can see them through any type of crisis – including ‘man-made disasters’ such as hacking or a server crash – that aren’t covered by typical disaster recovery (DR) plans.
Download ‘When the Cloud Evaporates’ at www.ironmountain.com/cloud-evaporates (registration required.)
With the aim of raising standards of governance and administration in defined contribution (DC) schemes, the UK Pensions Regulator has publishing a draft revised code of practice for consultation.
The new draft DC code is shorter and simpler, and sets out the standards of conduct and practice the regulator expects trustee boards to meet in complying with their legal duties, and to deliver better long term outcomes for retirement savers.
The new code will overhaul the existing DC code first published in 2013 to better support trustee boards and managers of schemes offering money purchase benefits as they adapt to major reforms introduced earlier this year.
The draft DC code includes a section which specifies what is required when it comes to business continuity. It reads as follows:
“We expect trustee boards to ensure that they have an adequate business continuity plan and that this is reviewed at least annually, and tested as appropriate. The complexity of this plan will dependon the size and complexity of the administration operation, but weexpect it to cover:
- loss of key personnel
- business disaster recovery
- safeguarding of data
- how to continue to process core financial transactions.
“Where a third party administrator is used, trustee boards will need to understand the business continuity arrangements that the service provider has in place, and be confident that it adequately mitigates any risks to member data and benefits.”
The consultation will run until the end of January 2016 before the DC code is laid in Parliament next May, and comes into force in July. The 2013 code remains in force until then.
One of the great things about cloud storage is its collaborative capabilities. With some relatively simple software, enterprises can make data available to a wide range of users via multiple devices across large geographic areas.
The problem is, not all data is appropriate for the public cloud, which is why many organizations are working to implement the same collaborative tools across their on-premises storage infrastructure. Ideally, this works best in a private cloud setting, although it can also function within a traditional storage array, but perhaps not with the same degree of scale and flexibility.
Much of this development is coming from firms that are already steeped in public cloud collaboration. Egnyte, which builds both cloud and on-premises file management systems, recently teamed up with collaboration firm Jive to enable greater collaboration across the entire enterprise data environment. The idea is to give users greater choice over where and how they store, access and share data, with Egnyte bringing secure, application-based file access and orchestration to the Jive platform and Jive helping Egnyte tie into multiple productivity offerings from Microsoft, Google and others.
Alphabet subsidiary Google has contracted for 61 MW of solar power with Duke Energy, the largest utility in the US, to power its North Carolina data centers.
While utility-scale renewable power purchase agreements are common for Google, this is the solar power contract that’s big enough for an entire data center. “This is the first time that we’re purchasing solar power in enough volume to power one of our data centers,” Gary Demasi, who oversees data center energy and location strategy at Google, wrote in a blog post.
The company has multiple data centers on its campus in Lenoir. The first data center there was constructed in 2007, and six years later the company announced an expansion project.
As the holiday season quickly approaches and holiday shopping begins, find a gift that truly show those you love how much you care—the gift of preparedness
While an emergency kit may not be on any of the top-ten big name gift lists this season, a starter kit could end up being the most important gift you give your friends and family this year. Most of us would love to be a little more prepared, but have not made the time or don’t know where to start. Often, just taking the first step towards getting prepared is the hardest part. Give your friends and family the gift of being prepared for the unexpected.
Need creative ideas for your gifts of preparedness? We’ve got you covered with these gift ideas:
The Starter Kit
Help get your friends thinking emergency prep with a few key items to start their emergency kit. Pack the items in a small plastic storage container or water-proof bag that can be stored easily. Include the following items:
- First aid kit (You can get a pre-made kit at most of your local drug stores or pharmacies)
- Flashlight and extra batteries
- Portable phone charger (also sometimes known as a portable battery. This charger should be rechargeable and have the ability to charge a phone without being plugged into a power source)
- Manual can openers (and a reminder that every emergency kit should include a three-day supply of food and water)
Emergency Prep for Kids
Sometimes the best way to get families thinking about emergency preparedness is through teaching kids about the importance of having an emergency kit, an emergency communication plan, and a family emergency response plan for every disaster.
Get kids excited and interested in emergency preparedness with CDC’s Ready Wrigley activity books. You can print coloring books for disasters including, extreme heat, tornadoes, hurricanes, earthquakes, and winter weather. Help kids check-off items on Ready Wrigley’s emergency kit list with some of the following items:
- Flashlight and extra batteries
- A battery-powered or crank weather radio
- Small and portable games or activities that can entertain kids if they have to shelter in place or evacuate to a shelter. (Small board games, playing cards, books or stuffed animals are good items to consider).
Emergency Kits for the Road
For the car-lovers or new drivers on your list, consider putting together a kit of emergency supplies they can keep in their car. Plan your gift based on local hazards. If you live in an area that gets significant amounts of snow you may consider including a windshield scraper, extra hats, coats, mittens, and blankets. For any emergency, your car kit include these basic items:
– Basic tool kit with pliers, a wrench and screwdriver
– Jumper cables (you may consider purchasing a “roadside emergency kit” from your local auto shop that also includes reflective triangle markers, gloves, and a flashlight)
– First aid kit
– Cellphone charger (either or a car charger, or rechargeable portable charger)
Pets and Pet Lovers
Remember to include pets in your emergency planning. Whether you are thinking of gifts for your furry friends or a gift for the pet lovers in your life, put together a gift of the following pet emergency kit items:
- Extra food and water for your pet, including an extra water and food bowl.
- Sturdy leash, harness, and carrier to transport pet safely. A carrier should be large enough for the animal to stand comfortably, turn around, and lie down. Your pet may have to stay in the carrier for several hours.
- Pet toy and a pet bed that can easily be stored and taken if you are forced to evacuate. (Remember to always check with your local emergency shelters before a disaster to find out which shelters take in pets).
All of these emergency packages are great gifts to help friends, family, or yourself start an emergency kit. Check out CDC’s Emergency Preparedness and You page for more tips on how to be prepared for any emergency.
(TNS) - Plans are accelerating for construction of a new regional Emergency Management Center in McAlester built to withstand an F5 tornado, nearby blasts, or explosions and even earthquakes.
When completed, the McAlester office will serve as the hub for emergency management services for all of southeastern Oklahoma — basically everything south of Interstate 40 and east of Interstate 35.
The building would also serve as local headquarters for the McAlester/Pittsburg County Office of Emergency Management — allowing personnel with the agency to move out of their current headquarters in the oft-flooded basement of the Pittsburg County Justice Center. Plans call for the building to also include office space for the Oklahoma Office of Emergency Management and the Choctaw Nation Office of Emergency Management.
For Tuscaloosa, Ala., there are lessons to be learned from the terror that gripped Paris just over a week ago.
After the Islamic State attacks, Democratic Mayor Walter Maddox took note of the Parisian security staff that prevented a suicide bomber from entering the French national soccer stadium. His thoughts turned to Bryant-Denny Stadium -- where more than 100,000 people gather for University of Alabama football games.
Maddox said he considered what could happen in his 95,000-person city. But he and some terrorism and security specialists say many chief executives and police departments in midsize U.S. cities may not realize that terrorism could put their people and infrastructure at just as much risk as high-profile targets like New York City and Washington, D.C.
McGraw-Hill Education's chief digital officer has driven the company's effort to leverage small data to improve student outcomes, teacher insights, and curriculum improvements. Here's why small is better than big.
In any individual math classroom there may be an advanced student, a dyslexic student, and many other students with various levels of proficiency and confidence in the current module of math. How can you customize the educational experience of each of these students to enable the best outcome? McGraw-Hill Education says it believes that small data, which in this case is data generated by how students interact with the curriculum, is the answer.
Stephen Laster joined the company as chief digital officer a little over three years ago to drive its implementation of small data to improve educational outcomes. He's someone who is passionate about education, and someone whose own educational experience was mixed.