More and more organizations are moving SharePoint and SQL workloads into Microsoft Azure in the cloud because of the simplicity of spinning up servers in the cloud, adding more capacity, decreasing capacity without having to BUY servers on-premise. What used to cost organizations $20,000, $50,000, or more in purchasing servers, storage, network bandwidth, replica disaster recovery sites, etc and delay SharePoint and SQL rollouts by weeks or month is now completely managed by spinning up virtual machines up in Azure and customizing and configuring systems in the Cloud.
By Rand Morimoto | 23 July, 2014 08:14
It's up to each one of us to figure out what in the daily surge of data is useful, what's crap and what's truly valuable.
By Julia King | 21 July, 2014 23:22
The Federal Trade Commission today announced the rules for its second robocall exterminating challenge, known this time as Zapping Rachel Robocall Contest. "Rachel From Cardholder Services," was a large robocall scam the agency took out in 2012.
By Michael Cooney | 19 July, 2014 06:45
Yes, users sometimes do stupid things. Some always will. But developers need to do more to save users from themselves.
By Kenneth van Wyk | 16 July, 2014 22:23
Doors just stop working when one old PC in a storage closet dies.
By J.F. Rice | 10 July, 2014 21:51
Facebook has grown and evolved in recent years. In addition to connecting people online, it bombards users with unnecessary ads and useless sponsored stories. And it runs experiments on its users. Columnist Alex Burinskiy is not amused.
By Alex Burinskiy | 09 July, 2014 05:19
Goldman Sachs is taking Google to court to force the cloud vendor to delete an email accidentally sent to a Gmail user. The consequences of a ruling for Goldman would be devastating.
By Evan Schuman | 08 July, 2014 22:40
A couple of years ago companies were dismissive of BYOD, but as they've realized that the horse left the stable, they are adopting policies and next generation technologies to help manage BYOD. They also recognize that successful mobile security requires a cooperative partnership with employees, so are working with them to determine what policy works best for both parties, allowing BYOD to become part of the enterprise mobile security framework.
By Subbu Iyer, Director of Product Management, Bluebox Security | 08 July, 2014 05:05
According to a recent article in the Wall Street Journal, corporate boards are getting much more involved in cybersecurity. What's driving this behavior? While the Target breach probably influenced this behavior, corporate boards now realize that cybersecurity has become a pervasive risk that could have an adverse impact on all businesses.
By Jon Oltsik | 08 July, 2014 05:00
Unless you've been living under a rock for the last couple weeks, you've no doubt heard about Facebook's creepy, secret, psychological experiment designed to see if negative newsfeed posts inspire more negativity -- and vice versa. I don't want to excuse Facebook's behavior, which has prompted a (sort-of) apology from Facebook COO Sheryl Sandberg, as well as an ongoing stream of condemnation and outrage from legitimate psychologists and Internet commentators. I too was weirded out by the revelations, feeling manipulated and that somehow my privacy had been unfairly invaded without my permission.
By Fredric Paul | 08 July, 2014 00:58
Microsoft brought the hammer down on No-IP and seized 22 of their domains. They also filed a civil case against "Mohamed Benabdellah and Naser Al Mutairi, and a U.S. company, Vitalwerks Internet Solutions, LLC (doing business as No-IP.com), for their roles in creating, controlling, and assisting in infecting millions of computers with malicious software--harming Microsoft, its customers and the public at large."
By Ms. Smith | 02 July, 2014 23:15
We previously looked at the huge demand for ProtonMail, an easy-to-use and free NSA-proof email service created by CERN and MIT scientists. It is based in Switzerland, meaning the U.S. government can't just hoover it up without an enforceable Swiss court order, which is hard to come by since the Swiss legal system has "strong privacy protections." The demand for the end-to-end encrypted email service was so high that ProtonMail ran out of a month's worth of server capacity in three days.
By Ms. Smith | 02 July, 2014 05:49
In a recent research survey, ESG asked security professionals to identify the most important type of data for use in malware detection and analysis (note: I am an employee of ESG). The responses were as follows:
By Jon Oltsik | 02 July, 2014 01:42
If you've ever ridden a hot streak "too long" at a blackjack table or left in a huff after the dealer hit 21 three times in a row, then you are no better at gambling than a rhesus monkey.
By Paul McNamara | 01 July, 2014 05:37
Last week I wrote about Comcast's plan to build the nation's biggest Wi-Fi service by co-opting their customers' Xfinity gateways and, following a detailed conversation with a representative from Comcast's Corporate Communications group, I have some corrections to make and quite a few additional concerns to add.
By Mark Gibbs | 26 June, 2014 23:54
Wednesday was a big day for technology cases in the Supreme Court. The Justices ruled on a pair of important cases that promise to have wide-ranging implications for the development and use of modern technology for years and decades to come. But the effects of the decisions aren't necessarily what either side in the cases has been arguing.
By Fredric Paul | 26 June, 2014 23:12
Like everything in life, there are a plethora of varying opinions when it comes to protecting privacy, freedom and civil liberties. Even when just looking among different privacy advocates, it's painfully clear that not everyone agrees. While I'm personally not a fan of finger-pointing or name-calling, and I do not know either of the authors concerned with privacy, there are bits and bytes from each that are worth pondering.
By Ms. Smith | 25 June, 2014 23:11
As the old infosec adage goes, "people are the weakest link in the cybersecurity chain." Clearly, enterprise security professionals agree with this statement. In a recent ESG research survey, enterprise security professionals were asked to identify the factors most responsible for successful malware attacks. It turns out that 58% point to "a lack of user knowledge about cybersecurity risks" – the most popular answer by far (note: I am an employee of ESG).
By Jon Oltsik | 25 June, 2014 01:57
Every so often something happens that should make people stop and think. That may have just happened in the Cloud.
By Brandon Butler | 25 June, 2014 00:40
Microsoft announced Interflow, a new platform for sharing cybersecurity threats in near real-time. Although it's currently available only in "private preview" for Microsoft Active Protections Program (MAPP) members, security threat information will be shared faster, creating a "collectively stronger cybersecurity ecosystem." In the long run that means protecting people better and more quickly.
By Ms. Smith | 24 June, 2014 06:03
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
The days of relying solely on local storage and in-house servers to deliver your data are well behind us. These days, it makes sense to move some (if not all) of your business’s services into the Cloud. From email to document management, much can be achieved with Internet services that can be accessed from anywhere in the world. The main benefit is that a proper Cloud service can make it easier to manage and share information with your workers and help boost productivity. Here, then, are the main reasons to consider a service such as Google Apps.
- Sprint to resell Google Apps for Business cloud service
- What to expect in Facebook's earnings call today
- Google tried to buy music giant Spotify
- Pebble: Next-gen wearables will require new tech, also your personal data
- Low-cost Android tablets to get 4K video with Allwinner 64-bit chip
- Apple unwraps OS X Yosemite public beta Thursday
- Seagate wireless drive can now stream to Roku set-top box
- Is Sony's Walkman set to make a comeback?
- UK government adopts ODF for document exchange with citizens and suppliers
- Dutch spy agencies can receive NSA data, court rules
- Oracle ships nearly 60 mobile apps for JD Edwards
- BlackBerry offers BES10 as a hosted service through partners
- Mozilla ships Firefox 31, adds search to new tab page
- Japan Airlines hopes smartwatches for gate staff will fly
- File-encrypting Android ransomware 'Simplocker' targets English-speaking users