Category Archives: Tech

Posted by:admin Posted on:Sep 29,2014
From electronic pills to digital tattoos, these eight innovations aim to secure systems and identities without us having to remember a password ever
Read More
Posted by:admin Posted on:Sep 15,2014
CIOs who want to drive innovation and change in their organizations should focus on making the lives of developers easier so they can innovate,
Read More
Posted by:admin Posted on:Sep 10,2014
Not realizing that your behaviors constitute harassment is no excuse I go to a lot of security conferences, but I never gave much thought to this
Read More
Posted by:admin Posted on:Sep 1,2014
Automation technology is getting better as help desk requests continue to rise Competing forces are affecting people who work on help or service
Read More
Posted by:admin Posted on:Aug 19,2014
Google is drawing from the work of the open-source community to offer its cloud customers a service to better manage their clusters of virtual
Read More
Posted by:admin Posted on:Aug 13,2014
7 cool uses of beacons you may not expect Beacons are a useful new twist on location awareness, tying a unique ID to a small device that apps can
Read More
Posted by:admin Posted on:Jul 26,2014
Rules designed to thwart man-in-the-middle attacks; could mean extra work for IT shops Public certificate authorities (CAs) are warning that as of
Read More
Posted by:admin Posted on:Jul 20,2014
Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Product name: APCON
Read More
Posted by:admin Posted on:Jul 10,2014
Anyone who works with technology knows that at some point or another, all computers behave as if they are evil supercomputers. But in the annals of
Read More
Posted by:admin Posted on:Jun 29,2014
Aligning IT with the business has been a top priority of IT organizations for the past few years, but that is changing, according to the latest State
Read More
Posted by:admin Posted on:Jun 22,2014
The Internet of Things gets real Practical applications are emerging for connected devices in key industries A year ago, people were mostly
Read More
Posted by:admin Posted on:Jun 16,2014
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. SQL injection attacks have been around for more
Read More
Posted by:admin Posted on:Jun 10,2014
Message from TrueCrypt that it’s being discontinued on SourceForge.net. The abrupt discontinuation of the disk and file encryption freeware
Read More
Posted by:admin Posted on:Jun 6,2014
The Internet of Things is growing, and the things are getting weirder by the day. Last year, we dug up some of the weirdest objects that had been
Read More
Posted by:admin Posted on:Jun 2,2014
Corporate departments act on their own, contending IT is too slow in creating a path to cloud services IT departments need to watch out for
Read More
Posted by:admin Posted on:May 29,2014
The more languages it learns, the better it becomes at the ones it learned first, but no one knows why Speech-to-speech translation technology
Read More
Posted by:admin Posted on:May 26,2014
I like the IBM Edge conference because it tries to showcase how infrastructure can provide a large company with a competitive edge. While the event
Read More
Posted by:admin Posted on:May 18,2014
Test network devices, track trouble tickets, remote control PCs, deploy phone apps, more IT pros who carry a Windows Phone already know it can be
Read More
Posted by:admin Posted on:May 14,2014
Just because BYOD has become normal operating process in most workplaces doesn't mean the practice has stopped up causing dispute for IT. Take San
Read More