Search

Filter:

Search Results

Developing automation experts internally

sophisticated software and its infrastructure backbone is configured and run via automation. This has given ...

Expect to pay solid, but realistic, IT salaries heading into 2015

skills--we're looking at 10, 11, 12 percent jump in wage earnings for them. The other areas where I think ...

Security in the cloud era, such as it is

the only way to get a message to them is to build a narrative-- a   story they can follow, not about ...

News from Strata: Business users crash the party and big data turns a new corner

in a meaningful way. I'll tell you more about that in the top story on Microsoft in this issue. On a personal ...

Newly uncovered security weakness could let hackers hide malicious Android app within another app

Articles: Hack opens the door to running Android apps on Windows, Mac Google targets the enterprise ...

Where's your latest network exploit? Check behind the coffee machine

"It's a fully functional little computer that runs a small version of Linux." What should ...

Bruce Schneier: NSA would rather eavesdrop than negotiate for bulk data

database run by Salesforce. I told Schneier some facts about it last week at a security conference here ...

'Lightning Man' demonstrates cross-platform mobile app builder

there are HTML5 development frameworks that run across mobile platforms, and there are front-end designer tools ...

Spotlight: How to identify fake big data products

Dan Woods, CTO and editor of CITO Research, penned a post in Forbes on how to identify fake big data products--and he even cites specific companies as examples. "To tell the difference between real and fake Big Data technology, when a vendor explains their story ask if the technology would help ...

Do you want fries with that iPhone?

really not that much of a rollout. We already have NFC terminals in more than 14 ...