Issue highlights 1. It's time for Fave Raves. What's your favorite enterprise IT product? 2. TrustyCon attendees literally take the NSA cake 3. Is SDN your next security nightmare? 4. Chinese government still sponsoring cyber-espionage, says FireEye COO 5. Look, Chrome, no hands: Google rolls out hands-free desktop search 6. Life at an iPhone factory in China 7. Who's hiring? Marketing lures more tech pros 8. RSA Conference mobile app has vulnerabilities, researchers say 9. Phablet Phrenzy: Mobile World Congress heralds the triumph of the giant smartphone 10. Examining the ridiculous names of open source projects 11. A graphics library war is a win for everybody 12. U.S. Senator trying to ban Bitcoin clearly doesn't know much about Bitcoin 13. The IETF needed a wake-up call on security, says chairman 14. Six things companies do that thwart their IT security efforts 15. Two Cool Tools to entertain the kids during winter, spring or summer vacation 16. When it comes to mybizcard.co LinkedIn has no backbone 17. Best new technology from Mobile World Congress 2014 |
WEBCAST: SAP On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who’s often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more |
Do you have a favorite enterprise IT product you can't live without? Tell us about it and we'll share your raves with our readers. READ MORE |
Cloud security company SpiderOak's sweet surprise at RSA Conference's alternative. READ MORE |
The big buzzword in networking these days is Software-Defined Networking (SDN), a de-coupling of the data plane and the control plane that allows you to manage physical devices via a software-based controller sitting on a general purpose server. READ MORE |
A year ago, Mandiant, since acquired by FireEye, issued a long report called "APT1" that accused China's People's Liberation Army of launching cyber-espionage attacks against 141 companies in 20 industries through a group known as "PLA Unit 61398" operating mainly from Shanghai. READ MORE |
The "OK, Google" passphrase already in use on Android mobile devices and Google Glass has arrived on the desktop, as Google announced the roll-out of hands-free voice search for desktop users of its Chrome browser this week. READ MORE |
WHITE PAPER: IBM Learn how IBM Tivoli Storage Manager Operations Center simplifies user experience and speeds problem resolution. Read Now |
Foxconn's factory in Zhengzhou, China employs 300,000 workers. Here's a visual tour of how Foxconn is transforming the area around its factory. READ MORE |
The hiring scene is changing for tech pros. Marketing departments are bolstering their technical ranks to help with big data, cloud, SEO, and mobile development initiatives. READ MORE |
A mobile application designed to make it easier for RSA Conference 2014 attendees to navigate the event and interact with their peers exposes personal information, according to researchers from security firm IOActive. READ MORE |
Phablets - or tablet-sized phones - are already stealing market share from tablets. READ MORE |
Some open source projects have the most ridiculous names, and even more ridiculous stories behind them. READ MORE |
WHITE PAPER: Crittercism The need for flawless, high-performing mobile apps is critical, yet many organizations struggle. This paper explains how to accurately analyze performance of mobile apps, calculate the cost of app failure, and how to develop, deploy and test mobile apps so that malfunctions don’t happen. Read more! |
Whether AMD woke Microsoft from its slumber or this was planned, it doesn't matter. READ MORE |
In the latest bit of bad news for the Bitcoin community, Senator Joe Manchin, a Democrat from West Virginia, has urged Congress to impose a ban on cryptocurrencies, citing its instability, difficulty to regulate, and use for criminal purposes. READ MORE |
Security and how to protect users from pervasive monitoring will dominate the proceedings when members of Internet Engineering Task Force meet in London starting Sunday. READ MORE |
Even as organizations strive to build and maintain a strong enterprise security program, there are a couple things companies do that actually thwart their efforts for strong security. READ MORE |
Over the past few weeks we've been snowbound several times, which also included a school vacation week. With my kids asking me for the one-millionth time "What can we do, Dad?", fortunately I had two technology-related items for the column to test out, and they would also appeal to the youngsters as well as adults. READ MORE |
READ MORE |
Smartphones, tablets, wearables on display at the show READ MORE |
WEBCAST: Citrix Systems Many enterprises have determined that a private cloud meets their strategic goals better than a public cloud. With lessons learned from successful private cloud adopters, you’ll hear best practices surrounding VM density planning and its impact on the network, understanding the importance of scale, key storage considerations and more. View now |
|
No comments:
Post a Comment