Issue highlights 1. Apple-IBM partnership off to 'impressive' start 2. INSIDER How to work out the kinks in the cloud 3. The four Mac security options everyone should know 4. Suing Arista was always the plan 5. 16 terrible computer pranks that could get you fired 6. The Onion's 10 greatest gags about Google 7. 3 Snapchat Alternatives for Self-Destructing Messages 8. 11 sites that can feel Sony's pain 9. Point-of-sale malware creators still in business with Spark, an Alina spinoff 10. 6 aging protocols that could cripple the Internet 11. BlackBerry Classic review: A killer smartphone for keyboard lovers 12. How colleges are failing their students 13. From ebola to Flappy Bird: These are the most popular Google Searches of 2014 14. The year in tech industry apologies 15. 12 most eye-popping VC tech deals of 2014 |
: Venafi Are you prepared for PCI DSS v3? The standard demands that IT security leaders have more visibility and security over keys and certificates. Find out what you need to know about next-generation trust protection to lock down your mobile environment. Learn More |
Apple and IBM last week kicked off their five-month-old partnership with an "impressive" 10-pack of focused mobile business apps catering to sectors ranging from financial to law enforcement."The three that I've seen were pretty impressive," said Van Baker, an analyst at Gartner. "They're very complex, with some drawing from three, four or more separate data sources."+ ALSO ON NETWORK WORLD... READ MORE |
Blame it on the public cloud service providers. It was, after all, the Amazons of the world that raised the bar by making the provisioning of IT resources look so easy. Why should users have to wait? If I can get it quickly and easily there, the reasoning goes, why can't I get the same agility from my internal data... READ MORE |
As our lives increasingly go digital, security is a major concern not only for the various online services we use, but also for the devices on which we save our data. Chances are that if you're reading this article, you own a Mac. And on your Mac, you'd like much of the work you do on it to be kept... READ MORE |
Suing Arista was always the plan. It appears there was no intention to attempt to negotiate a royalty arrangement with the company after Cisco discovered potential infringement of its patents and copyrighted material.CEO John Chambers didn't answer our question last week on whether Cisco did indeed attempt to hammer out a royalty deal with Arista. He said he couldn't comment... READ MORE |
Look, you're an adult human being. You're better than this. Don't do any of the things in this slideshow. READ MORE |
Webcast: IBM Corporation Over 61,000 virtualization customers have weighed in. Join the webcast and hear how other companies like yours are using virtualization to their benefit. Learn More |
Targeting Google"America's Finest News Source," better known as The Onion, has been poking fun at Google for more than a decade. Here are 10 of what we believe are its better efforts.Teacher Just Hopes They Never Google HimPublished: Aug 22, 2012To read this article in full or to leave a comment, please click here READ MORE |
A number of embarrassing emails from Sony execs recently leaked during the company's high-profile hacking scandal — enough to make some organizations rethink how their workforce uses email.One way companies can protect themselves from email hacks is to stop using it for sensitive messages (or insensitive messages, given some of the racist remarks the Sony hack exposed). The upcoming BlackBerry/Boeing phone that... READ MORE |
Sony isn't the only oneImage by Craig SunterSure the Sony hack has taken up all the headlines of late, but there is a laundry list of other breaches that have taken place all over the world. Here are a few incidents in the past couple of years that resulted in the release of password information. This list was compiled in... READ MORE |
A malware program dubbed Spark that steals payment card data from compromised point-of-sale (POS) systems is likely a modification of an older Trojan called Alina, and highlights a continuing, lucrative business for cybercriminals.Spark steals card data from a compromised system's RAM (random access memory) when it's being processed by specialized software running on the machine. Similar memory scraping malware was... READ MORE |
Internet protocols on the brinkImage by Kheng ho TohThe biggest threat to the Internet is the fact that it was never really designed. Instead, it evolved in fits and starts, thanks to various protocols that were cobbled together to fulfill the needs of the moment. Few of those protocols were designed with security in mind. Or if they were, they... READ MORE |
Webcast: Fortinet Many WiFi Retail Presence Analytics platforms promise the world, but provide little more than a collection of reports and meaningless data. Fortinet Presence Analytics is different, delivering a platform that helps you better understand customer behavior, engage more closely with your customers and actually influence their purchasing decisions. Learn more >> |
If you're still using a BlackBerry smartphone with a "physical" QWERTY keyboard, or if you've switched platforms but still harbor fantasies about a return to the good old days when you didn't spend as much time cursing your on-screen keypad as you do typing on it, the BlackBerry Classic is the smartphone you've been waiting for.BlackBerry returned to its roots... READ MORE |
Most traditional four-year colleges are great at teaching students theoretical knowledge, critical thinking, history, literature and even computer science, but where these institutions fall short in a key area: teaching graduates the skills they need to land jobs after school and manage their careers.MORE ON NETWORK WORLD: Tech CEOs' first jobs "There's a major disconnect between what colleges believe their... READ MORE |
Google just released its annual retrospective on what the world was searching for in 2014. The company has apparently given up on calling its year in review the Google Zeitgeist and opted for the more humble "Year in Search." The lists include everything from top trending overall searches to top trending GIFs.ALSO ON NETWORK WORLD: Google Graveyard: Here's what Google... READ MORE |
SorryImage by Flickr/ Neil SloranceTo read this article in full or to leave a comment, please click here READ MORE |
While the three largest venture capital deals of the year in the technology industry went to consumer-focused startups, most of the other top investments went to companies building products that could reshape the enterprise IT landscape. Final numbers for the amount of venture capital money poured into startups in 2014 have not yet been tallied, but already experts say 2014... READ MORE |
White Paper: IBM Working with IBM Business Partner Silanis Technology Inc., Signature Mortgage implemented a cloud-based solution using Silanis e-SignLive integrated services and the IBM SmartCloud Engage social collaboration service. Signature Mortgage now processes loans in less than 25 days, compared to a national average of 45 to 60 days, and loan volume Learn More>> |
|
No comments:
Post a Comment