Quantcast
Channel: InfoWorld Lamont Wood
Browsing all 49 articles
Browse latest View live
↧

3D chips: The next electronics revolution

To accomplish anything in the suburbs, you need to get in your car and drive to another address. Downtown, in a skyscraper, you just use an elevator.To read this article in full or to leave a comment,...

View Article


Today, the Internet -- tomorrow, the Internet of Things?

Embedded in the heel of his shoe was an early example of the Internet of Things -- but Andrew Duncan didn't know it at the time."My girlfriend was able to watch me on the computer screen as I did a...

View Article


Printer ink: How to spend less

Human blood costs about $17.27 an ounce, silver about $34 an ounce. But both are bargains compared to the ink sold to the owners of inkjet printers, which can exceed $80 an ounce. Meanwhile, the ink...

View Article

Today, printers. Tomorrow, 'integrated peripherals'?

Out went 42 aging black and white copiers with interface boxes that let them serve as printers. In went 42 new networked multi-function printers (MFPs) that could do color printing and copying and scan...

View Article

Incubator grows firms via geek service swaps

Drawn with colored markers, the large sales chart is handsomely done. But it's drawn on the window. Carlos Maestas, occupant of one of the three desks in the office, has no idea what it represents. He...

View Article


Emergency! EN systems alert employees when disaster strikes

Having evacuated to a hotel in Pennsylvania in the face of Superstorm Sandy, Scott Thompson's problems had only begun.To read this article in full or to leave a comment, please click here(Insider Story)

View Article

Hackathons for the rest of us

When Moshe Tamssot walked out of a Chicago hackathon in August 2010, he had a new business and a new business partner.Most hackathon attendees go just to have fun, of course, and that's been enough to...

View Article

Malware: War without end

Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.Today, around 5 percent of the average IT budget is devoted...

View Article


Boost your security training with gamification -- really!

Getting employees to take security seriously when security is not their job is an old challenge that now has a new answer: Gamification.That's right; game-like elements can be used to enhance security...

View Article


Mobile security: A mother lode of new tools

Long, complex passwords that must be input on tiny screens, often while on the move: Such hassles make password-based security unworkable in a mobile world. But change is coming, thanks to an...

View Article

Image may be NSFW.
Clik here to view.

The 8080 chip at 40: What's next for the mighty microprocessor?

It came out in 1974 and was the basis of the MITS Altair 8800, for which two guys named Bill Gates and Paul Allen wrote BASIC, and millions of people began to realize that they, too, could have their...

View Article

IT jobs market booming in the Southwest

2015 IT Salary & Jobs Regional Report: The Southwest The coasts might have the high-profile IT employers-- big banks and insurance companies, Google, Apple and Microsoft. But the Southwest is the...

View Article

Emerging enterprise techs to watch

New technologies affecting enterprise IT continue to be invented, commercialized and adopted. The latest batch of techs looming on the horizon, examined in greater detail below, include quantum...

View Article


Real-time computing: Gateway to the Internet of things?

Real-time computing means much more than getting a seemingly immediate response after hitting Enter. In fact, its real meaning involves interfacing to real machines doing real things in, well, their...

View Article

Mobile apps get the crowdsourcing treatment

When developing mobile enterprise applications, there are two basic options: Plan the process in advance in exquisite detail or listen to user feedback and iterate as you go. The latter approach, by...

View Article


Multi-factor authentication goes mainstream

Fingerprints, rather than passwords, are what more than a million financial services customers at USAA use to get online. Part of a trend toward multi-factor authentication (MFA), there is no stored...

View Article

Printer security: Is your company's data really safe?

On March 24 of this year, 59 printers at Northeastern University in Boston suddenly output white supremacist hate literature, part of a wave of spammed printer incidents reported at Northeastern and on...

View Article


Side-channel power, the new security front

Side channels used to be avenues for cyber attacks. Today, one side channel has been elevated to a new front line for cyber defense, and it may go on to be a bulwark for the internet of things...

View Article

The march toward exascale computers

It's good to be near the top of the list.As for the embargo's likely effectiveness, #1 on the Top500 list happens to be China's Sunway TaihuLight at the National Supercomputing Center in Wuxi. It...

View Article

Smartphone CPUs put desktops to shame

Fighting severe size and power constraints, the makers of smartphones have achieved levels of ingenuity not seen on the desktop. This results in mobile devices that not only have multiple cores, but...

View Article
Browsing all 49 articles
Browse latest View live