Tech

  • 5 ways to give IT recognition

    IT’s work can be hidden away and therefore ignored. But it can pay to put a spotlight on it. Appreciating IT workers We all like to know that our efforts are appreciated. For people working in IT, recognition is too often neglected, simply because so much of what IT workers […]

  • What Microsoft’s ‘fresh start’ browser strategy means

    A new browser not named ‘IE’ would give Microsoft ways to leave legacy support behind Microsoft will unveil a browser not named Internet Explorer (IE) alongside Windows 10, according to an online report. Long-time Microsoft watcher and ZDNet blogger Mary Jo Foley cited unnamed sources on Monday to say that […]

  • Finding critical business data — fast

    These CIOs are jumping on a fast-moving trend — mining small data sets to deliver valuable insights quickly to the right people at the right time. A lot of security processes failed during the breach of Target’s systems during last year’s holiday season, but one surprising revelation was that the […]

  • Cloud upstarts: Too cheap to trust?

    New Amazon competitors offer some compelling deals in the cloud, but at what price? Hosting provider Atlantic.net launched a $0.99 per month cloud server this fall, which is significantly less expensive than the $0.013 per hour starting price for market-leader Amazon Web Services’ on-demand Elastic Compute Cloud (EC2) virtual machines. […]

  • Thwarting attackers with threat intelligence

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. News reports show cyber attacks continue to outpace IT’s ability to protect critical data, but teams that have built systems to deliver accurate threat intelligence […]

  • Groupware hug: Lotus Notes turning 25

    In an interview first published Dec. 2, 2004, Ray Ozzie walks us through the history This coming Sunday marks the passing of 25 years since the initial release of Lotus Notes, known today as IBM Notes. In marking the 15th anniversary 10 years ago, I spoke with Ray Ozzie about […]

  • 8 holiday scams and mistakes to avoid

    You’re not the only one feeling merry and bright this holiday season – so are the criminals! This time of year provides them with plenty of opportunities for Scrooge-worthy scams. Here’s how to ensure all they’ll get is coal in their stocking Happy hacker days Yes, ‘tis the season to […]

  • Doxxing defense: Remove your personal info from data brokers

    Don’t want your home address or other personal info published to the world? This weekend, take an hour or two to make yourself a less visible target. Many women gamers and developers, as well as those who support them, have lately come under attack from online trolls. A common intimidation […]

  • Symantec IDs sophisticated ‘Regin’ malware

    The back-door-type Trojan was likely developed by a nation state Symantec researchers have identified a particularly sophisticated piece of malware, called “Regin” that was likely developed by a nation state and has been used to spy on governments, infrastructure operators, businesses, researchers and individuals since at least 2008. “Regin displays […]

  • Patch Tuesday: 16 security advisories, 5 critical for Windows

    All supported versions of Windows are affected including Windows 10 technical preview Microsoft is issuing the largest number of monthly security advisories since June 2011, five of them critical and affecting all supported versions of Windows. And applying the patches will be time consuming, experts say. “Next week will tell […]