Over the past 5-yrs, organizations have complained about Microsoft Outlook calendaring problems where users describe issues of calendar appointments not showing up, meeting appointments disappearing, calendar delegate issues occurring, just overall "odd" behavior of calendars. It usually happens in mixed environments where some users are Apple Mac users, and some users (frequently the exec admin / delegate) running Windows, and typically active use of iPhones, iPads, Android, or other mobile devices and tablets. And over the past 5-yrs, I have actively blogged about the problem and the solution to FIX the calendaring inconsistencies.
By Rand Morimoto | 02 April, 2015 00:21
Now that net neutrality is the law of the land, you may feel inclined to pat yourself on the back for a job well done. After all, a big reason the FCC backed net neutrality was the outpouring of support for it.
By Preston Gralla | 31 March, 2015 05:59
Now we know why Facebook ripped Messenger out of the mobile version of the Facebook app last April: Messenger was destined to become a "platform" in its own right, complete with an API and developer program to help and encourage software companies to make Facebook Messenger-specific apps.
By Mike Elgan | 28 March, 2015 22:08
Back in the dark ages, when the only way to get onscreen entertainment was by tuning in a television set at a specific time (get home late? miss your favorite show? too bad for you!), networks had a habit of scheduling similar shows opposite each other. The notion was presumably, that the competition would cause one show to win out over the other, which would eventually drop in the ratings and get cancelled. The idea that viewers might be interested in seeing both apparently was not in the networks' psychology.
By Barbara Krasnoff | 27 March, 2015 05:01
It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to exploit child labor, run sweatshops or avoid taxes and rigorous health and safety inspections. Now the U.S. government says something similar is happening in regards to email.
By Evan Schuman | 18 March, 2015 01:56
You're going to be hearing a lot about a new app called Meerkat.
By Mike Elgan | 16 March, 2015 05:00
Though she may have broken no laws, Hillary Clinton acted irresponsibly in using a personal email account to conduct official U.S. government business in her capacity as secretary of State.
By Kenneth van Wyk | 13 March, 2015 08:01
Lenovo pre-installing Superfish software was a security disaster. Whether Lenovo was evil, or, as they eventually claimed, merely incompetent, it's hard to trust them going forward. If nothing else, their initial denials that anything was wrong, leave a lasting impression. Of course, Superfish, along with the software that they bundled from Komodia, also deserve plenty of blame for breaking the security of HTTPS and SSL/TLS.
By Michael Horowitz | 10 March, 2015 00:07
Organisations that were born digital are built around their IT platform, and all their business processes are IT-driven and data-powered. Every action, every decision, is based on the processing of data sets about users and customers, about usage patterns, external conditions, etc.
By Yves de Montcheuil | 07 March, 2015 05:44
On Feb. 26, the Federal Communications Commission voted, along strict party lines, to approve new net neutrality rules by reclassifying broadband as a regulated public utility. So does that save the Internet or lock it up in a bureaucratic, censored, expensive prison?
By Steven J. Vaughan-Nichols | 06 March, 2015 22:49
Smartphone makers like Apple, Samsung and others have flirted with different materials to make their smartphones -- metal, plastic, even glass front and back with the iPhone 4 line.
By Mike Elgan | 28 February, 2015 23:12
Several electronic and mobile payment options have become available, but most of us in the U.S. are still using plain-vanilla credit and debit cards with magnetic stripes. They use technology that dates to the first Nixon administration. That's not a problem in itself; I have no problem with time-tested security measures that work effectively. But just look around: Data breaches are everywhere, and those magnetic-stripe cards are often implicated.
By Kenneth van Wyk | 27 February, 2015 03:07
President Obama's secret plan to protect the "open Internet" is locked inside the Federal Communications Commission. We don't know what's in the 322 pages, but we are told it includes a transparency rule.
By By Bret Swanson | 26 February, 2015 01:04
Toys always reflect the larger culture -- its biases, fears and, most of all, its technology. New York's Toy Fair 2015 happened this week, and the latest round of new tech toys is bringing some of the most disturbing tech trends to children.
By Mike Elgan | 24 February, 2015 06:28
Everyone knows that Apple had a great fourth quarter and that its most successful product line, the iPhone, is doing better than ever, too.
By Mike Elgan | 17 February, 2015 04:21
White Castle might not be the first company that comes to mind when high tech is mentioned, but the restaurant chain found itself in the middle of the patent troll controversy when it started sending menu updates from its headquarters to digital screens in restaurants around the country.
By By Steven Titch | 11 February, 2015 03:42
As the private sector continues to invest in data-driven innovation, the capacity for society to benefit from this data collection grows as well. Much has been said about how the private sector is using the data it collects to improve corporate bottom lines, but positive stories about how that data contributes to the greater public good are largely unknown.
By By Josh New | 05 February, 2015 08:37
When Amazon unveiled its cloud-based corporate WorkMail email offering last week (Jan. 28), it stressed the high-level of encryption it would use and the fact that corporate users would control their own decryption keys. But Amazon neglected to mention that it will retain full access to those messages -- along with the ability to both analyze data for e-commerce marketing and to give data to law enforcement should subpoenas show up.
By Evan Schuman | 03 February, 2015 20:07
If you tuned into Parks And Recreation Tuesday night, you were treated to an episode where social media startup Gryzzl attempts to win over the hearts and minds of its new neighbors in the fictional town of Pawnee with boxes full of gifts, delivered via Amazon-esque drones.
By Matt Weinberger | 29 January, 2015 09:04
Poor, slow-footed old Microsoft. It just can't adapt to changing times or keep up with more innovative, agile and forward-looking companies like Apple and Google. That's been the way many of us have thought of Microsoft for a long time. But it may be our thinking that's old and outdated.
By Preston Gralla | 29 January, 2015 00:55
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- FT.Net Solution ArchitectNSW
- CC.Net Solution ArchitectNSW
- CCDBA (Oracle/SQL)NSW
- CCSenior Systems EngineerNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCMobile Designer / Developer - IOSNSW
- CCMobile iOS DeveloperNSW
- FTSenior SQL DBANSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCInformation ArchitectNSW
- FTDigital Account Manager - SEO, SEM, MediaNSW
- CCInformation ArchitectNSW
- CCMobile Designer / Developer - IOSNSW
- FTApplication Support SpecialistNSW
- CCSenior Release EngineerNSW
Today’s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers to damage web-facing applications by exhausting resources. F5 BIG-IP ASM provides application-layer protection against DDoS attacks.
- Salesforce acquires mobile authentication firm Toopher
- Wider use of HTTPS could have prevented attack against GitHub
- Lawyer cites government theft charges in bid for Silk Road retrial
- Uber pushes for reform in wake of Harper review
- N.C. primed for mega tech backlash over Indiana-like bill
- Where SDN falls down
- Health care industry receives first mobile apps from Apple, IBM
- Raspberry Pi 2 laptop coming with Pi-Top assembly kit
- Facebook 'riffs' on Snapchat with new group video app
- Cisco to buy SDN startup Embrane
- Start-up touts wireless charging from Wi-Fi and Bluetooth signals
- Google amps up assault on adware
- ARM fades from Windows PCs and tablets, but grows in Chromebooks
- Chef serves up devops for the enterprise
- Over 100,000 devices can be used to amplify DDoS attacks via multicast DNS