Issue highlights 1. BlackBerry has high hopes for 2014 2. Quantum crypto, standard private key blended for first time 3. Unique malware evades sandboxes 4. Verizon to report on law-enforcement data requests 5. CEO Says CIOs Need to Be a Source of Energy and Innovation 6. AmEx, BoA, Discover tweet me reassurances re: Target breach 7. Techify your Holiday Sweater 8. IDC: Hobbyist programmers on the rise 9. BYOD Became the 'New Normal' in 2013 10. Geek-Themed Meme of the Week Archive |
RESOURCE COMPLIMENTS OF: Netop - NWW Support smartphones and tablets running Android 4.0 wherever they're located. With Netop Remote Control Mobile for Android support staff can gain real-time screen transfer and control of the device, transfer files and chat. Learn more. |
After a nearly disastrous year and facing an expected negative earnings report Friday, BlackBerry hopes to start 2014 on a more positive note with its news interim CEO and a commitment to help developers more easily port Android apps to the BlackBerry World app store. READ MORE |
ID Quantique has found a way to blend quantum-key cryptography with more traditional crypto, the Advanced Encryption Standard (AES). The effect is to gain certain advantages offered by both for private-key-based encryption. READ MORE |
Malware utilized in the attack last month on the developers' site PHP.net used a unique approach to avoid detection, a security expert says. READ MORE |
WHITE PAPER: iLand Internet Solutions To date, IT organizations have been forced to sacrifice transparency to get the scalability, improved performance, and other benefits provided by a public cloud. This paper discusses how you can now get the same visibility in the public cloud that you have in your own data center or even better. Learn More |
Verizon Communications will report on law-enforcement requests for information on its customers that it received in 2013, following similar moves that major online companies have made but rival AT&T has not. READ MORE |
Allstate's CEO says the CIO's office is only 20 feet away, so he can easily get thoughts from "one of the architects of our business innovation." READ MORE |
Given the standard definition of a serious data breach -- one that involves a store where I shop regularly - this morning's news about Target had me genuinely concerned about my credit cards and bank accounts. But rather than don my press hat - or, perish the thought, call customer service -- I decided to engage my card issuers on the matter via Twitter. The results were surprisingly satisfying ...... READ MORE |
WEBCAST: Novell Mobile Employees in the workplace. Watch this webcast. Click Here>> Learn More>> |
Techify your Holiday Sweater From TechHive (IDG sister publication): Create a more tech-friendly holiday sweater with these helpful hints. From: Network World Videos Views: 3 0 ratings Time: 02:36 More in Science & Technology READ MORE |
An increasing amount of programming is being conducted by non-professional programmers, a new IDC study has found. READ MORE |
CIOs have had eventful year when it comes to BYOD. Concerns over hidden costs, employee privacy and corporate data security gave way to convenience. However, mobile device management vendors stepped in to help IT sell the concept of compliance and lawyers and the National Labor Relations Board jumped to the aid of employees smacked with draconian BYOD policies. READ MORE |
They are inescapable on the Internet. Most are awful. A few are not, so we have started publishing a selection of memes that amuse me. One every week. Here's the archive. READ MORE |
WHITE PAPER: AT&T Getting peak value from mobile technologies takes a wide range of applications and services. Here are four capabilities every end-to-end mobile management solution must include. Learn More |
|
No comments:
Post a Comment