•
These CIOs are jumping on a fast-moving trend — mining small data sets to deliver valuable insights quickly to the right people at the right time. A lot of security processes failed during the breach of Target’s systems during last year’s holiday season, but one surprising revelation was that the […]
•
Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done Web developer apps for your Android device As Web developers, most of us love to stay connected to the Web. Now with the […]
•
New Amazon competitors offer some compelling deals in the cloud, but at what price? Hosting provider Atlantic.net launched a $0.99 per month cloud server this fall, which is significantly less expensive than the $0.013 per hour starting price for market-leader Amazon Web Services’ on-demand Elastic Compute Cloud (EC2) virtual machines. […]
•
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. News reports show cyber attacks continue to outpace IT’s ability to protect critical data, but teams that have built systems to deliver accurate threat intelligence […]
•
In an interview first published Dec. 2, 2004, Ray Ozzie walks us through the history This coming Sunday marks the passing of 25 years since the initial release of Lotus Notes, known today as IBM Notes. In marking the 15th anniversary 10 years ago, I spoke with Ray Ozzie about […]
•
You’re not the only one feeling merry and bright this holiday season – so are the criminals! This time of year provides them with plenty of opportunities for Scrooge-worthy scams. Here’s how to ensure all they’ll get is coal in their stocking Happy hacker days Yes, ‘tis the season to […]
•
Don’t want your home address or other personal info published to the world? This weekend, take an hour or two to make yourself a less visible target. Many women gamers and developers, as well as those who support them, have lately come under attack from online trolls. A common intimidation […]
•
The back-door-type Trojan was likely developed by a nation state Symantec researchers have identified a particularly sophisticated piece of malware, called “Regin” that was likely developed by a nation state and has been used to spy on governments, infrastructure operators, businesses, researchers and individuals since at least 2008. “Regin displays […]
•
Google’s newly completed Apps suite can’t beat Apple’s improved iWork or Microsoft Office The on-the-go business app toolkit for the iPad Of the tens of thousands of apps available for the iPad, only a relative few are must-have tools for business use. In the last year, the landscape for iPad […]
•
All supported versions of Windows are affected including Windows 10 technical preview Microsoft is issuing the largest number of monthly security advisories since June 2011, five of them critical and affecting all supported versions of Windows. And applying the patches will be time consuming, experts say. “Next week will tell […]