Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
MongoDB's Eliot Horowitz: The Database Renaissance Has Begun
October 08, 2013
NoSQL technologies are giving the database landscape a new look as they steadily push a shift from the relational database model. Young entrants to the alternative technology, such as MongoDB, have been gaining traction despite an admitted need to mature with more needed features. "For MongoDB as a part of the NoSQL space, it is a matter of maturity," said Eliot Horowitz, CTO of MongoDB.
Galileo Gives Gadget Makers Great Power
October 04, 2013
Intel on Thursday announced Galileo, a microcontroller development board made jointly with open source hardware company Arduino for the education and maker markets. Based on Intel's recently announced Quark system on a chip, the Galileo board will be available by the end of November for less than $60, said Intel spokesperson Kari Aakre.
Microsoft Tops Corporate Social Responsibility Rankings
October 04, 2013
Microsoft has topped the Reputation Institute's Global CSR RepTrak 100 Study for the second year in a row. The institute surveyed 55,000 consumers worldwide about their attitudes toward the reputations of companies in terms of corporate social responsibility. Google, which was No. 2 last year, fell to third place. Four of the top 10 companies in the study are tech firms.
Feds Get Serious About Email Preservation
October 02, 2013
In a paperless society, office file cabinets may become an endangered species. However, the need to store documents will remain. The U.S. government is struggling to develop efficient means to retain billions of electronic messages. NARA is playing a central role through its new Capstone program, which uses a system for the transfer of designated emails from an agency to a NARA archive.
Coverity's Zack Samocha: Software Quality and the Open Source Advantage
October 01, 2013
Software quality is a topic close to most developers' hearts, whether they work with open source or proprietary code. Assessing quality, however, isn't always a simple matter. As a result, several efforts have sprung up to tackle the challenge, including the Coverity Scan project. Coverity began work in 2006 on the open source project, which is a joint endeavor with the Department of Homeland Security.
Valve Releases Steam Controller
September 30, 2013
Valve Software has announced the Steam Controller, the third part of its trio of initiatives designed to bring Linux-based gaming to the living room. Valve dubbed the controller "a different kind of gamepad." It features dual circulator trackpads driven by the player's thumbs. Each has a high-resolution haptic pad at its base, which is clickable, allowing the entire surface to act as a button.
IDF2013: Intel's Evolution Hugs the Inside Track
September 30, 2013
Silicon Valley loves an underdog. That's partly because such tales feed the industry's self-mythologizing and the IPO culture that attracts fresh money. To be honest, IT can boast more than its fair share of such successes: Hewlett and Packard, Jobs and Wozniak, and Page and Brin all helped make the industry what it is today. However, mythic underdogs also serve as distractions from another truth.
IT Solutions Navigator Cuts Through Choppy Procurement Waters
September 25, 2013
Vendors seeking to obtain federal information technology contracts are regularly challenged to deal with a variety of complex factors. These include negotiating special IT security requirements, tricky service level agreements, and a growing number of government contracting vehicles that have been developed over the past few years to facilitate IT contracting.
AlienVault's Barmak Meftah: Time to Put Hackers on the Defensive
September 24, 2013
As CEO of AlienVault, Barmak Meftah faces enemies every day who play out their attacks from faraway lands using seemingly unbeatable weapons. One of the weapons AlienVault uses with the support of the open source community is a global report called the Open Threat Exchange that tracks threats to computer networks. The results make it possible to identify trouble spots and take corrective action.
BYOD Security Is All About Juggling Risks
September 23, 2013
Allowing workers to use personal phones and tablets to do their jobs has created security risks in the workplace, but those risks can be minimized if they're managed. What should such a risk management program do? "The first step is you have to protect the device," said IBM Application, Data and Mobile Security Director Caleb Barlow. That includes everything from provisioning to data wiping.
Cracking the BYOD Security Nut
September 23, 2013
While so-called BYOD isn't necessarily new -- IT departments, after all, have been supporting mobile road warriors since the 1980s -- the rising tide of end users seeking the use and support of their own consumer devices is different. It's so different that IT departments are grasping for any standard or proven approaches that make BYOD access of enterprise resources both secure and reliable.
Federal Networks Can't Handle Planned IT Upgrades
September 18, 2013
Ambitious plans to improve federal information technology systems could easily founder on the shoals of deficient networks. Government agencies currently are striving to meet the challenges associated with initiatives in five major areas: cloud technology; Big Data management; cybersecurity requirements; data center consolidation; and, increasingly, mobile IT.
Needle in a Haystack: Harnessing Big Data for Security
September 14, 2013
The combination of the polymorphic nature of malware, failure of signature-based security tools, and massive amounts of data and traffic flowing in and out of enterprise networks is making threat management using traditional approaches virtually impossible. Until now, security has been based largely on the opinions of researchers who investigate attacks.
NSA Comments Put Zuckerberg's Political Clout to the Test
September 12, 2013
Facebook CEO Mark Zuckerberg did not pull any punches Wednesday in describing the U.S. government's communications approach to revelations that the National Security Agency has been accessing digital conversations around the world -- and using tech companies such as Facebook in the process. "Frankly, I think the government blew it," Zuckerberg told the audience at the TechCrunch Disrupt conference.
Apple's Big Rollout: Yawns Today, Brawn Tomorrow?
September 11, 2013
Onward and upward, or so the executive suite at Apple is clearly hoping. Tuesday's rollout of the iPhone 5c and the iPhone 5s -- and their related features and design quirks -- came as little surprise to company watchers as Apple's product pipeline has long been prone to leaks and speculation.
VCE's Digital Factory Vision
September 11, 2013
Technology has always enabled the "factorification" of processes and skills for both users and suppliers of IT. The success of early computing solutions rested in replacing hundreds and thousands of Bob Cratchett-like professionals with systems that required few, if any, sick days and no vacations. Then businesses discovered they needed to hire hundreds or thousands of technical gurus.
Treasure Data's Hiro Yoshikawa: Taking the Open Road With Big Data
September 10, 2013
Businesses and government agencies are in a race to gather, quantify and clarify an ever-increasing stream of data. Housing the bits and pieces of their digital treasures can be just as much of a problem as deciding whether to trust traditional relational platforms or adopt more flexible databases designed to handle unstructured data.
Icahn Concedes Defeat to Dell 'Dictators'
September 09, 2013
Activist investor Carl Icahn has given up his fierce struggle to prevent Michael Dell from buying his namesake company and taking it private. In a letter to shareholders, filed with the SEC on Monday morning, Icahn said Dell would be paying a price approximately 70 percent below its 10-year high of $42.38, and accepting the bid would undermine "Dell's great potential."
No End to the Headaches Endpoints Give System Defenders
September 03, 2013
If there's one attack surface that's attracting growing attention from digital marauders, it's a system's endpoints. With the proliferation of BYOD, securing connections can be a defender's nightmare. Endpoints have an allure for attackers because they offer multiple attack vectors, such as social engineering attacks, spearphishing, USB infection, and compromise of WiFi networks and routers.
4 Quick and Dirty SaaS Technical Controls
September 03, 2013
Because of the rapid pace of SaaS adoption, many security practitioners have found themselves scrambling to ensure the security of the specific technologies their enterprises want to employ. However, the dynamics of SaaS can make this a challenging exercise. This is because most of the options for specific security controls are, by necessity, of the contractual or procedural variety.

See More Articles in IT Section >>
Facebook Twitter LinkedIn Google+ RSS