April 2026 Tech Upload

The NEW Digital Alliance would like to thank Heartland Business Systems, Microsoft and TDS for their support as Executive Level investors!

NEW Digital News

Register Now & Save! 2026 New North Summit

Registration is now open for the 2026 New North Summit!

Take advantage of the Early Bird Rate!

Register before April 15 and save with the early bird rate. The 2026 Summit will be held from 7:30 a.m. to 4:30 p.m. on Tuesday, June 9, and will feature a variety of presenters, plus ample networking time for attendees. Visit our New North Summit website to learn more!

Interested in becoming a sponsor for the largest regional economic development networking event? Contact us today at renee.torzala@thenewnorth.com or 920.336.3860.

Tuesday, June 9, 2026
Lambeau Field Atrium
Green Bay, WI

REGISTER HERE for the SUMMIT

This Month in IT History: April

April has been a defining month for innovation in the tech world—marking the birth of industry giants, breakthrough technologies, and pivotal decisions that shaped the digital age.

📅 April 1, 1976
Apple is Founded
Apple Inc. was launched by Steve Jobs, Steve Wozniak, and Ronald Wayne—laying the foundation for one of the most influential companies in modern technology.

📅 April 3, 1973
The First Mobile Phone Call
Martin Cooper of Motorola made the first handheld mobile phone call, launching the mobile revolution. The phone weighed about 2.5 pounds and had a battery life of just 30 minutes.

📅 April 4, 1975
Microsoft is Founded
Microsoft was founded by Bill Gates and Paul Allen, shaping the future of personal and enterprise computing.

📅 April 7, 1969
The Internet’s First Standard (RFC 1)
The first “Request for Comments” document was published—establishing a collaborative framework still used to define internet protocols today.

📅 April 14, 1981
Launch of Space Shuttle Columbia
Space Shuttle Columbia took flight with advanced onboard computing systems, advancing real-time and mission-critical software design.

📅 April 19, 2005
YouTube’s First Video
YouTube co-founder Jawed Karim uploaded the platform’s first video, sparking the era of user-generated content.

📅 April 30, 1993
The Web Goes Public
CERN made the World Wide Web free and open to everyone—fueling the rapid growth of the internet.

📅 April 22, 2010
Launch of Apache Hadoop 1.0
Apache Hadoop reached its 1.0 release.
👉 Why it matters: Hadoop helped pioneer big data processing, enabling modern data analytics and cloud-scale computing.


💡 Did You Know?
Both Apple and Microsoft—two of the most influential companies in tech history—were founded just three days apart in April, marking this month as a cornerstone in the evolution of modern computing.

Upcoming northeast Wisconsin IT events

Sip & Sync Green Bay
Thursday, April 2
8:00 – 9:00 a.m.
Karvana Coffee House (Green Bay)

Organizer: Women in Technology

WI Governor’s Cybersecurity Summit
Tuesday & Wednesday, April 7-8
Fox Cities Exhibition Center

Organizer: State of Wisconsin & Government Technology

Product Thinking in an AI-First World | WiT Virtual Series
Friday, April 10
12:00 – 1:00 p.m.
Virtual

Organizer: Women in Technology

Amplify IT 2026: Amplifying Human ______!?
Tuesday, April 14
10:00 a.m. – 3:30 p.m.
UW-Oshkosh Culver Welcome Center

Organizer: Amplify Oshkosh

Sip & Sync Appleton
Wednesday, April 15
8:30 – 9:30 a.m.
Copper Rock Coffee Company (College Ave location)

Organizer: Women in Technology

Train‑the‑Trainer Cybersecurity Capture‑the‑Flag Experience
Thursday, April 16
11:30 a.m. – 4:00 p.m.
Vox Valley Technical College

Organizer: Women in Technology

Sip & Sync De Pere
Tuesday, April 21
8:00 – 9:00 a.m.
Ed’s Cafe (inside Mulva Library)

Organizer: Women in Technology

Cybersecurity Roundtable: Cyber Hygiene for a Hybrid Workforce
Wednesday, April 22
12:00 – 1:00 p.m.
Virtual

Organizer: NEW Digital Alliance

Wisconsin Tech Summit
Thursday, April 30
9:30 a.m. – 6:00 p.m.
Oshkosh Corporation Headquarters 

Organizer: Wisconsin Technology Council

Managing the Growing Liability of Rapid AI Upgrades

(Photo cred: Sadoff E-Recycling)

By Sadoff E-Recycling & Data Destruction

The rapid adoption of AI is driving one of the fastest hardware refresh cycles in decades, as organizations replace traditional server infrastructure with high-performance systems built for AI workloads. While this shift enables innovation, it is also creating a surge of retired IT equipment that many organizations are not fully prepared to manage.

This influx of decommissioned hardware introduces significant risks. Old servers and storage devices often contain sensitive data and hazardous materials, and if they are not properly handled, they can become both a security vulnerability and an environmental liability.

A key challenge is maintaining a secure chain of custody during large-scale upgrades. When equipment is removed in high volumes, gaps in tracking or disposal processes can lead to lost assets and potential data exposure. At the same time, organizations remain legally responsible for how that equipment is ultimately recycled or disposed of.

However, the article notes there is also opportunity within this challenge. Retired hardware often still holds residual value, and organizations that implement structured IT asset disposition strategies can recover capital and reinvest it into future technology initiatives.

Why it matters: As AI adoption accelerates, organizations need to align their upgrade strategies with secure and compliant disposal processes to avoid turning innovation into a costly liability.

Read full article here

State of Digital Transformation 2026 Report

(Photo cred: TEKsystems)

By TEKsystems

How Leaders Use AI, Cloud and Automation To Stay Competitive

Digital Transformation Trends for 2026

A new report from TEKsystems highlights a major shift in digital transformation strategies, with organizations moving beyond experimentation and focusing on measurable business outcomes. In 2026, improving employee productivity has overtaken customer experience as the top priority, signaling a stronger focus on internal efficiency and operational impact.

AI is playing a central role in this evolution. Many organizations are increasing investment in AI, with generative AI emerging as the technology expected to deliver the greatest operational impact over the next one to two years. This reflects a broader transition from pilot programs to scaled, real-world implementation.

However, as adoption accelerates, so does complexity. Organizations are facing growing challenges related to legacy systems, siloed teams, and the need for stronger alignment across people, processes, and technology. At the same time, expectations around return on investment are becoming more realistic, with fewer leaders expecting quick wins from transformation efforts.

The report also notes that investment levels continue to rise, as companies commit more resources to transformation initiatives in order to stay competitive in an increasingly digital and AI-driven landscape.

Why it matters: Digital transformation is no longer about adopting new technology—it’s about delivering real business value. Organizations that can effectively scale AI while managing complexity will be best positioned to lead.

Read full article here

Other IT News

Optiv’s trek to becoming 100% passwordless

(Illustration: Anna Kim, Photo: Adobe Stock)

By Brianna Monsanto
IT Brew

“The user experience is just substantially better than constantly having to reset passwords,” Gregory says.

Cybersecurity firm Optiv is working toward a fully passwordless environment, part of a growing trend as organizations look to reduce risks tied to stolen or weak credentials. Passwordless authentication replaces traditional passwords with methods like biometrics, device-based verification, or app-based approvals, helping mitigate phishing and breach risks.

Optiv is rolling out this transformation in phases, starting with centralized access via single sign-on (SSO), followed by QR code-based authentication tied to employees’ mobile devices. The company emphasizes combining multiple factors, like something you have (a device) and something you are (biometrics), without ever requiring a password.

The shift isn’t just about security, it’s also improving user experience by eliminating password resets and login friction. Early feedback from employees has been overwhelmingly positive.

However, going fully passwordless is complex. Optiv highlights the importance of phased implementation, strong user education, and testing both technology and processes before rollout. The company’s next step is enabling passwordless device login for a seamless end-to-end authentication experience.

Why it matters: With over 90% of CISOs either implementing or planning passwordless strategies, this approach is quickly becoming a foundational element of modern identity and access management.

Click here to read the full article

NCSC warns vibe coding poses a major risk to businesses

(Image credit: Getty Images)

By 
IT Pro

Vulnerability management approaches are not maturing fast enough to keep up with the downsides of AI-generated code

The UK’s National Cyber Security Centre (NCSC) is warning organizations about the growing risks of “vibe coding”, a trend where developers use AI tools to generate code with minimal oversight. While these tools can accelerate development and make coding more accessible, they also introduce significant security vulnerabilities if not properly managed.

One of the biggest concerns is that AI-generated code may include hidden flaws, insecure dependencies, or poor architecture, especially when users don’t fully understand or review what’s being created. This can lead to insecure applications being pushed into production environments.

The NCSC emphasizes that organizations adopting these tools need to evolve their security practices, including stronger governance, code review processes, and developer training. Without these safeguards, the rapid rise of AI-assisted development could expand the attack surface and introduce new types of cyber risk.

At the same time, experts note that vibe coding isn’t inherently bad, it can boost innovation and productivity when used responsibly. The key is treating AI-generated code as untrusted by default and ensuring human oversight remains a critical part of the development lifecycle.

Why it matters: As AI-driven development becomes more mainstream, organizations that balance speed with security controls will be better positioned to avoid costly vulnerabilities and technical debt.

Read full article here

AI Skills Move Into the Core of Job Requirements

(Photo cred: Shutterstock)

By Jaime Hampton
AIwire

AI skills are rapidly shifting from a “nice to have” to an essential requirement across many roles, according to recent research from Zapier and Anthropic. Employers are increasingly expecting workers, not just technical specialists, to understand and effectively use AI tools in their daily work.

The demand is not limited to coding or engineering. Organizations are prioritizing practical AI fluency, including writing prompts, evaluating outputs, and integrating AI into everyday workflows. This reflects a broader shift as AI becomes embedded across functions like marketing, operations, and beyond.

At the same time, job seekers are investing in AI-related skills to stay competitive in a changing labor market. Those who can combine domain expertise with AI capabilities are becoming especially valuable to employers.

However, this rapid adoption is also creating a skills gap. Many organizations are still determining how to train employees effectively and ensure teams can use AI tools safely and productively.

Why it matters: As AI becomes part of everyday work, professionals who can confidently apply these tools will have a clear advantage in hiring and career growth.

Read full article here

How Businesses Can Secure IoT Data in Transit

(Photo cred: IoT For All)

By Andrej Kovacevic
IoT For All

As IoT adoption continues to expand, businesses are gaining valuable real-time data and operational insights. However, this rapid growth is also introducing significant data security challenges, as more connected devices create additional entry points for cyber threats.

One of the biggest risks is the complexity of IoT ecosystems. With devices, networks, cloud platforms, and applications all interconnected, a vulnerability in any layer can expose sensitive business data. Many organizations underestimate this complexity, leaving gaps in protection.

The article highlights that securing IoT environments requires a comprehensive, end-to-end approach. This includes encrypting data, managing device identities, securing networks, and ensuring applications are built with security in mind from the start.

Another key challenge is visibility and control. Organizations often struggle to monitor all connected devices, making it difficult to detect threats or respond quickly to incidents. As IoT deployments scale, this lack of oversight can significantly increase risk.

Why it matters: As IoT becomes more central to business operations, organizations that prioritize security at every layer will be better positioned to protect data, maintain trust, and avoid costly breaches.

Read the full article here