Software

Microsoft Outlook Calendar Corruption, Lost Meetings, Duplicate Appointments - April/2015 Update

Over the past 5-yrs, organizations have complained about Microsoft Outlook calendaring problems where users describe issues of calendar appointments not showing up, meeting appointments disappearing, calendar delegate issues occurring, just overall "odd" behavior of calendars. It usually happens in mixed environments where some users are Apple Mac users, and some users (frequently the exec admin / delegate) running Windows, and typically active use of iPhones, iPads, Android, or other mobile devices and tablets. And over the past 5-yrs, I have actively blogged about the problem and the solution to FIX the calendaring inconsistencies.

By Rand Morimoto | 02 April, 2015 00:21

Tags: Apple, Microsoft Subnet, applications, Microsoft, content management, software

We've got net neutrality. Now the real work begins.

Now that net neutrality is the law of the land, you may feel inclined to pat yourself on the back for a job well done. After all, a big reason the FCC backed net neutrality was the outpouring of support for it.

By Preston Gralla | 31 March, 2015 05:59

Tags: new york times, telecommunication, The New York Times, net neutrality, ookla, fcc, internet, broadband

Why Facebook Messenger will fail as a 'platform'

Now we know why Facebook ripped Messenger out of the mobile version of the Facebook app last April: Messenger was destined to become a "platform" in its own right, complete with an API and developer program to help and encourage software companies to make Facebook Messenger-specific apps.

By Mike Elgan | 28 March, 2015 22:08

Tags: Line, Internet-based applications and services, WeChat, ESPN, social media, internet, Facebook

The signs of spring: Birds, flowers and new tech

Back in the dark ages, when the only way to get onscreen entertainment was by tuning in a television set at a specific time (get home late? miss your favorite show? too bad for you!), networks had a habit of scheduling similar shows opposite each other. The notion was presumably, that the competition would cause one show to win out over the other, which would eventually drop in the ratings and get cancelled. The idea that viewers might be interested in seeing both apparently was not in the networks' psychology.

By Barbara Krasnoff | 27 March, 2015 05:01

Tags: abc, Mobile & Wireless, galaxy, htc, hardware systems, CBS, software

Where's the data?

It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to exploit child labor, run sweatshops or avoid taxes and rigorous health and safety inspections. Now the U.S. government says something similar is happening in regards to email.

By Evan Schuman | 18 March, 2015 01:56

Tags: Apple, data security, at&t, security, Electronic Freedom Foundation, Microsoft, data protection

Understanding the Meerkat live-streaming magic

You're going to be hearing a lot about a new app called Meerkat.

By Mike Elgan | 16 March, 2015 05:00

Tags: Internet-based applications and services, Apple, twitter, social media, internet, video, mobile apps

Don't get into an email mess

Though she may have broken no laws, Hillary Clinton acted irresponsibly in using a personal email account to conduct official U.S. government business in her capacity as secretary of State.

By Kenneth van Wyk | 13 March, 2015 08:01

Tags: Carnegie Mellon University, email, data security, security, data protection

Web browsers are also to blame for Lenovo's Superfish fiasco

Lenovo pre-installing Superfish software was a security disaster. Whether Lenovo was evil, or, as they eventually claimed, merely incompetent, it's hard to trust them going forward. If nothing else, their initial denials that anything was wrong, leave a lasting impression. Of course, Superfish, along with the software that they bundled from Komodia, also deserve plenty of blame for breaking the security of HTTPS and SSL/TLS.

By Michael Horowitz | 10 March, 2015 00:07

Tags: Apple, web browsers, Komodia, Firefox, Google, Microsoft, security, Lenovo, Gogo

5 steps for transforming your business using data

Organisations that were born digital are built around their IT platform, and all their business processes are IT-driven and data-powered. Every action, every decision, is based on the processing of data sets about users and customers, about usage patterns, external conditions, etc.

By Yves de Montcheuil | 07 March, 2015 05:44

Tags: applications, data mining, software, big data

Pulling net neutrality from a swamp of lies

On Feb. 26, the Federal Communications Commission voted, along strict party lines, to approve new net neutrality rules by reclassifying broadband as a regulated public utility. So does that save the Internet or lock it up in a bureaucratic, censored, expensive prison?

By Steven J. Vaughan-Nichols | 06 March, 2015 22:49

Tags: net neutrality, Federal Communications Commission, fcc, internet

Confessions of a technobiophiliac

Smartphone makers like Apple, Samsung and others have flirted with different materials to make their smartphones -- metal, plastic, even glass front and back with the iPhone 4 line.

By Mike Elgan | 28 February, 2015 23:12

Tags: Motorola, Apple, consumer electronics, Google, Lenovo, Personal Technology

Rating the payment options

Several electronic and mobile payment options have become available, but most of us in the U.S. are still using plain-vanilla credit and debit cards with magnetic stripes. They use technology that dates to the first Nixon administration. That's not a problem in itself; I have no problem with time-tested security measures that work effectively. But just look around: Data breaches are everywhere, and those magnetic-stripe cards are often implicated.

By Kenneth van Wyk | 27 February, 2015 03:07

Tags: Apple, Google Wallet, mobile payments, Google, mastercard, EMV, mobile, Square, Apple Pay

The FCC's Orwellian Internet policy

President Obama's secret plan to protect the "open Internet" is locked inside the Federal Communications Commission. We don't know what's in the 322 pages, but we are told it includes a transparency rule.

By By Bret Swanson | 26 February, 2015 01:04

Tags: white house, net neutrality, Federal Communications Commission, fcc, internet

Tech toys train tots for a troubling tomorrow

Toys always reflect the larger culture -- its biases, fears and, most of all, its technology. New York's Toy Fair 2015 happened this week, and the latest round of new tech toys is bringing some of the most disturbing tech trends to children.

By Mike Elgan | 24 February, 2015 06:28

Tags: Apple, consumer electronics, Google, Microsoft

Why Apple is the most successful company in history

Everyone knows that Apple had a great fourth quarter and that its most successful product line, the iPhone, is doing better than ever, too.

By Mike Elgan | 17 February, 2015 04:21

Tags: business issues, Apple, financial results, apple mac

Patent trolls: Congress gets down to business

White Castle might not be the first company that comes to mind when high tech is mentioned, but the restaurant chain found itself in the middle of the patent troll controversy when it started sending menu updates from its headquarters to digital screens in restaurants around the country.

By By Steven Titch | 11 February, 2015 03:42

Tags: patents, Technology Law & Regulation, patent trolls, intellectual property, legal, White Castle

A lot of private-sector data is also used for public good

As the private sector continues to invest in data-driven innovation, the capacity for society to benefit from this data collection grows as well. Much has been said about how the private sector is using the data it collects to improve corporate bottom lines, but positive stories about how that data contributes to the greater public good are largely unknown.

By By Josh New | 05 February, 2015 08:37

Tags: Pfizer, applications, data mining, software, big data

Can you trust Amazon's WorkMail?

When Amazon unveiled its cloud-based corporate WorkMail email offering last week (Jan. 28), it stressed the high-level of encryption it would use and the fact that corporate users would control their own decryption keys. But Amazon neglected to mention that it will retain full access to those messages -- along with the ability to both analyze data for e-commerce marketing and to give data to law enforcement should subpoenas show up.

By Evan Schuman | 03 February, 2015 20:07

Tags: Amazon Workmail, amazon, Apple, Google, security, encryption

'Parks And Recreation,' Facebook and The New Privacy

If you tuned into Parks And Recreation Tuesday night, you were treated to an episode where social media startup Gryzzl attempts to win over the hearts and minds of its  new neighbors in the fictional town of Pawnee with boxes full of gifts, delivered via Amazon-esque drones.

By Matt Weinberger | 29 January, 2015 09:04

Tags: security, computerworld, data privacy, twitter, privacy

HoloLens: Look who's innovating

Poor, slow-footed old Microsoft. It just can't adapt to changing times or keep up with more innovative, agile and forward-looking companies like Apple and Google. That's been the way many of us have thought of Microsoft for a long time. But it may be our thinking that's old and outdated.

By Preston Gralla | 29 January, 2015 00:55

Tags: Microsoft, european union, Windows, Windows 10, software, operating systems, HoloLens, Apple, Microsoft Windows, Reuters, Google

Top Whitepapers

Twitter Feed

Featured Whitepapers