Search

Filter:

Search Results

News Scan: Obama to ink cellphone 'unlocking' bill; EU okays Apple's $3B Beats buy; more

>> SAP launches new enterprise app store for Mobile Secure customers SAP announced on Monday a new ...

Homeland Security builds SWAMP; Internet engineers descend to depths of ocean;

and "crap" in a headline for a serious story.  Why the 'Hard Drive-Sniffing Dog' Should Scare ...

Cloud orchestration platform Cloudify rethinks its entire purpose

ownCloud innovates unique collaboration scheme Oracle's new Orchestrator aims to help NFV do whatever ...

CIOs casting their own 'Shadow IT'

an evolving financial relationship between an organization and its end users, one that involves a new IT business model that will be fraught with risk until new governance processes mature to guarantee adequate ...

iPhone 6 sales to take off; Repent, IoT is near;

28, 2014 And finally...  Dilbert's boss learns new jargon (Jay Ferro) ...

Also Noted: Hiring with science; How to handle EU censorship; More

>  Hiring with science: Big data brings better recruits (Forbes) >  Getting started in data science: My thoughts  (Trey Causey Blog) >  Banned on Google: How to fight EU censorship (Data Science Central) >  Data science cheat sheet (Data Science Central) And Finally...  New Glassdoor features use ...

Security strategies needed to cover future IoT, BYOD culture

to communicate--26 billion units by 2020, according to Gartner--but that opens up users to many more security ...

What 'Internet of Things' means today: production line visibility

examination of the RFID/Obamacare conspiracy Related Articles: Cisco tries new collaboration, compliance tools ...

Big data, big crashes: State Department's passport and visa database crash

of data, and has a current growth rate of approximately 35 thousand visa cases every day. It was created ...

Dropbox disabling links to possible PDF malware, reports Cyren

executable 'backdoor...' which CYREN detected as W32/Androm.AQ," reports Cyren. "New malware is executed and installed on the user's system, enabling an attacker to take full control ...