Network World Daily News PM | | Microsoft faces not only its 40th anniversary in 2015, but a host of challenges that will define it for years to come, analysts said today.The company, which is in the midst of a strategic do-over after switching CEOs and admitting that its earlier approach to the explosion of mobile wasn't working, has a hard row to hoe, experts said.MORE ON NETWORK WORLD: 10 (FREE!) Microsoft tools to make admins happier "Next year is also the 20th anniversary of Windows 95," noted Wes Miller of Directions on Microsoft. "Remember that? People stood in line to get Windows 95. Everyone was excited. That's the big deal for 2015, whether Microsoft can reinvigorate the consumer ecosystem."To read this article in full or to leave a comment, please click here READ MORE | | Issue highlights 1. Apple's 10 biggest hits, misses, and head-scratchers of 2014 2. Trojan program based on ZeuS targets 150 banks, can hijack webcams 3. What story are security leaders telling themselves? 4. Hybrid cloud adoption set for a big boost in 2015 5. FBI concludes North Korea 'responsible' for Sony hack 6. 10 IT roles to target when poaching talent 7. Microsoft files suit against alleged tech support scammers 8. Sony Baloney 9. Cyberattack on German steel factory causes 'massive damage' | White Paper: OutSystems This paper chronicles the adventures and misadventures of the enterprise mobile app journey based on our observations working with industry leaders who have weathered three years of pain to arrive at the same conclusions. Learn More | Setting the stage for 2015Apple had a blockbuster year. New iPhones, new iPads, a mobile payment solution that might actually change the way we pay, and an entirely new product category in Apple Watch.That's not to say there weren't missteps: iOS 8.0.1, anyone?We recap the year in Apple, from the high of record-breaking iPhone orders to the low of legal... READ MORE | A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.The new threat, dubbed Chthonic, is based on ZeusVM, a Trojan program discovered in February that is itself a modification of the much older ZeuS Trojan."The Trojan is apparently an evolution of ZeusVM,... READ MORE | "Welcome to the tech team, Michael. When you do a good job, no one notices. If you screw up, the whole world will come down on you. So don't screw up."That was my greeting at my first job. I think it was meant as a pep talk.When I share this with audiences and clients, I hear quiet chuckles and see... READ MORE | White Paper: PC Connection | EMC End User Computing solutions with XtremIO deliver massive, consistent I/O performance to ensure that every desktop provides an ideal user experience. Learn More | Spurred in large part by enterprise interest in the hybrid cloud, the overall cloud market is likely to see great growth in the coming year.Industry analyst firm IDC predicts that the global cloud market, including private, public and hybrid clouds, will hit $118 billion in 2015 and crest at $200 billion by 2018. If the market shows that much growth... READ MORE | North Korea was responsible for the devastating cyberattack on Sony Pictures, the U.S. Federal Bureau of Investigation said Friday after a two-week investigation.The attack on Sony occurred in late November and resulted in the theft of thousands of files that, after being leaked online, proved highly embarrassing for the company. Financial documents, legal and business agreements, confidential information on employees... READ MORE | 10 IT Roles to Target When Poaching TalentImage by ThinkStockThe boldest approach to recruiting is what John Sullivan, an internationally recognized HR thought leader, author, speaker and consultant calls a "hire-to-hurt," or H2H, a strategy which involves identifying and "… hiring in order to gain knowledge, best practices or new skills.To read this article in full or to leave a... READ MORE | White Paper: IBM This solution brief highlights IBM Value-based Archiving Solutions, which help enable organizations to apply specific archiving logic—including content-based analytics and classification, records declarations, and metadata processing—to address the requirements of archiving projects. View Now>> | Microsoft is finally cracking down on scammers who offer to fix non-existent computer problems for hundreds of dollars. In a first strike, Microsoft sued several U.S. companies it said are involved in fake tech support scams. For years, people have been receiving calls from companies pretending to be official Microsoft tech support staff, who try to convince the victim that... READ MORE | Hack at Sony Pictures exposes other cybersecurity issues: Ignorance, hype, and the lack of a national and International strategy. READ MORE | A German steel factory suffered massive damage after hackers managed to access production networks, allowing them to tamper with the controls of a blast furnace, the government said in its annual IT security report.The report, published Wednesday by the Federal Office for Information Security (BSI), revealed one of the rare instances in which a digital attack actually caused physical damage.The... READ MORE | White Paper: IBM Forrester has released its 2014 Dynamic Case Management Wave, and for the second consecutive time, IBM is a leader. View Now>> | | | | | | | | |
No comments:
Post a Comment