15 Ara 2025
Picture this. You’re wandering the collections of the majestic Cambridge University Library, which “probably began life in the fourteenth century as a collection of manuscripts stored in chests.” You pause to admire a Sumerian clay tablet; its six lines of cuneiform are the oldest bits of writing in the institution’s safekeeping (2200 BC). Further on, you’re awestruck by a first edition of Isaac Netwon’s seminal Principia, its margins filled with the polymath’s handwritten annotations (1669 AD).
As you make your way to the room that houses the library’s own Gutenberg Bible (~1455 AD), you encounter a crowd forming around a mysterious object. Whatever this new acquisition is, it’s causing quite a stir! Your curiosity is almost unbearable as you approach, until you finally set eyes on what reveals itself to be…a floppy disk (1971 AD)?
Read on to learn why Cambridge library technicians care so much about the humble floppy. But first, a handful of fascinating IT news and research items from around the web.
Vague tickets like “It’s broken” cost time and morale. Leadership should reward well-formed tickets and model clarity. Profiling users, such as “busy” employees or technophobes, can help IT teams create tailored solutions like structured forms with mandatory fields or micro-learning guides. Tracking ticket quality as a KPI (currently done by only ~25% of orgs), enforcing attachments, and real-time feedback reduce resolution times and SLA breaches, transforming support into a proactive, efficiency-driven operation.
Key quote:
“A vague ticket problem is rarely an individual problem. It’s a cultural one that festers when IT is seen merely as a reactive service instead of a collaborative partner. The tone you set at the top—the CIO, the VP of Technology, the service desk manager—determines whether people treat IT like a vending machine or a trusted consultancy.”
New research from Wiz found that 65% of leading AI companies exposed sensitive credentials on GitHub, including API keys and tokens granting access to private models. One breach revealed access to over 1,000 models. Despite a combined valuation of $400 billion, nearly half failed to act on breach alerts. Essential defenses include mandatory secret scanning before commits, depth scanning of forks and deleted repos, incident response protocols, and developer training in secure DevSecOps practices.
Key quote:
“Secrets leakage has often been described as an iceberg: a set of known risks exposed publicly in GitHhub organizations, but also a deeper risk below the surface in commit history, deleted forks, workflow logs etc.”
A randomized study of over 19,500 healthcare employees found that annual cybersecurity training and embedded phishing simulations provided minimal real-world benefit. No significant link was found between recent training and reduced phishing failures, and embedded training lowered failure rates by just 1.7%. More than half of users ended training sessions within 10 seconds, and less than a quarter of users complete the assigned materials.
Key quote:
“Moreover, we observe that all of these groups still have failure rates of over 15 % for several phishing simulations, and that some phishing lures achieve over 25% click rates. Such failure rates significantly overshadow the improvements provided by the training: better phishing lures increase failure rates much more than the training approaches decrease them.”
Cambridge University Library is preserving floppy disks, some nearly 50 years old, as magnetic coatings deteriorate and threaten permanent data loss. The team of retro-computing experts, library technicians, and archivist found few existing resources to guide them through disk preservation, so they’re documenting best-practices and workflows for public use.
Key quote:
“Through Leontien’s work [Leontin Talboom, project lead], imaging Cambridge University’s Library own collection of around 150 floppy disks, remarkable discoveries have been made, including the personal files of Stephen Hawking and abstract lists by English poet Nicholas Moore. Leontien is also getting ready to image disks formatted for the Lexitron machine, one of the earliest word processers.”
These summaries were written with AI assistance.