Augmented reality: Next-gen headsets show business promise
Technology entrepreneur Raven Zachary has seen things he has difficulty talking about.To read this article in full or to leave a comment, please click here(Insider Story)
View ArticleHackathons for the rest of us
When Moshe Tamssot walked out of a Chicago hackathon in August 2010, he had a new business and a new business partner.Most hackathon attendees go just to have fun, of course, and that's been enough to...
View ArticleMalware: War without end
Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.Today, around 5 percent of the average IT budget is devoted...
View ArticleBoost your security training with gamification -- really!
Getting employees to take security seriously when security is not their job is an old challenge that now has a new answer: Gamification.That's right; game-like elements can be used to enhance security...
View ArticleMobile security: A mother lode of new tools
Long, complex passwords that must be input on tiny screens, often while on the move: Such hassles make password-based security unworkable in a mobile world. But change is coming, thanks to an...
View ArticleThe 8080 chip at 40: What's next for the mighty microprocessor?
It came out in 1974 and was the basis of the MITS Altair 8800, for which two guys named Bill Gates and Paul Allen wrote BASIC, and millions of people began to realize that they, too, could have their...
View ArticleIT jobs market booming in the Southwest
2015 IT Salary & Jobs Regional Report: The Southwest The coasts might have the high-profile IT employers-- big banks and insurance companies, Google, Apple and Microsoft. But the Southwest is the...
View ArticleEmerging enterprise techs to watch
New technologies affecting enterprise IT continue to be invented, commercialized and adopted. The latest batch of techs looming on the horizon, examined in greater detail below, include quantum...
View ArticleReal-time computing: Gateway to the Internet of things?
Real-time computing means much more than getting a seemingly immediate response after hitting Enter. In fact, its real meaning involves interfacing to real machines doing real things in, well, their...
View ArticleMobile apps get the crowdsourcing treatment
When developing mobile enterprise applications, there are two basic options: Plan the process in advance in exquisite detail or listen to user feedback and iterate as you go. The latter approach, by...
View ArticleMulti-factor authentication goes mainstream
Fingerprints, rather than passwords, are what more than a million financial services customers at USAA use to get online. Part of a trend toward multi-factor authentication (MFA), there is no stored...
View ArticlePrinter security: Is your company's data really safe?
On March 24 of this year, 59 printers at Northeastern University in Boston suddenly output white supremacist hate literature, part of a wave of spammed printer incidents reported at Northeastern and on...
View ArticleSide-channel power, the new security front
Side channels used to be avenues for cyber attacks. Today, one side channel has been elevated to a new front line for cyber defense, and it may go on to be a bulwark for the internet of things...
View ArticleThe march toward exascale computers
It's good to be near the top of the list.As for the embargo's likely effectiveness, #1 on the Top500 list happens to be China's Sunway TaihuLight at the National Supercomputing Center in Wuxi. It...
View ArticleSmartphone CPUs put desktops to shame
Fighting severe size and power constraints, the makers of smartphones have achieved levels of ingenuity not seen on the desktop. This results in mobile devices that not only have multiple cores, but...
View ArticleAugmented reality: Next-gen headsets show business promise
Technology entrepreneur Raven Zachary has seen things he has difficulty talking about.To read this article in full, please click here(Insider Story)
View ArticleBoost your security training with gamification -- really!
Getting employees to take security seriously when security is not their job is an old challenge that now has a new answer: Gamification.That's right; game-like elements can be used to enhance security...
View ArticleMobile security: A mother lode of new tools
Long, complex passwords that must be input on tiny screens, often while on the move: Such hassles make password-based security unworkable in a mobile world. But change is coming, thanks to an...
View ArticleThe 8080 chip at 40: What's next for the mighty microprocessor?
It came out in 1974 and was the basis of the MITS Altair 8800, for which two guys named Bill Gates and Paul Allen wrote BASIC, and millions of people began to realize that they, too, could have their...
View ArticleIT jobs market booming in the Southwest
2015 IT Salary & Jobs Regional Report: The Southwest The coasts might have the high-profile IT employers-- big banks and insurance companies, Google, Apple and Microsoft. But the Southwest is the...
View Article