We use cookies to provide you with a better experience. By continuing to browse the site you are agreeing to our use of cookies in accordance with our Cookie Policy.
The problem is, with the dizzying array of online information available, how do you pull together the best content without spending half your day searching to find it? The answer may be easier than you think - TechWatch for IT Pros.
Facebook's big blue hand is reaching out to scoop up more of your data for monetization. The dossier giant has rivaled Beyonce in spreading itself around the world, except it exhorts websites and apps to "put a Facebook button on it" instead of a ring. It has steadily colonized the Web and app-o-sphere with "Like buttons," "conversion pixels," and Facebook log-in options, which all feed information back to Facebook about what its users are up to when they're not on Facebook. Now...
Forbes.com came under digital attack last week. It began Thursday and continued into Friday. On Twitter, the Syrian Electronic Army, supporters of Syrian President Bashar al-Assad, claimed responsibility,...
It's been about five years since the last redesign of my website, Hitched. A lot has changed since then, most particularly the rise of mobile. While we made sure our website was mobile compatible all those years ago, it wasn't (and still isn't) optimized for smaller screens. Needless to say,...
I'm as big a believer in the transformational power of cloud computing as anyone you'll meet. Smartphones, which are constantly seeking and retrieving data, don't make sense without the cloud, and any business that isn't racing to push its data and software into someone else's data center is, in my view, setting itself up for disruption by a competitor who is. But...
The massive data centers that power services from Google, Facebook, IBM and other tech giants are big-time energy hogs. But researchers around the world are starting to turn them into an energy source. Data centers are large facilities filled with servers and other equipment. In the United States, data centers are responsible for more than 2% of the country's electricity usage, according to researchers at Villanova University. If the global cloud computing industry ...
At a unique gathering of data-analytics leaders, new solutions began emerging to vexing privacy, talent, organizational, and frontline-adoption challenges. This past October, eight executives from companies that are leaders in data-analytics got together to share perspectives on their biggest challenges. All were the most senior executives with data-analytics responsibility in their companies, which included...
For the world's economy to get full value from technological innovation, it must have a robust, coordinated approach to cybersecurity. A new report from the World Economic Forum and McKinsey & Company looks at how that could happen...
Each year, the Internet Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide members with a forward-looking view of the biggest security threats over a two-year horizon. Here are the top 10 threats through 2016...
Hollywood isn't afraid to bend the truth to tell a tale. The data centers depicted in five popular movies prove this point -- as do the ways characters get into them and steal data from them. Hollywood loves data center cameos. In many feature films, a guy sneaks into the server room and places a diabolical gadget next to a server. Usually,...
Who says privacy is dead? While it's true that marketers, the government, data aggregators and others are gathering and analyzing more data than ever about every individual, you can still exert some control over what's out there, who's tracking you and what they do with that information...
Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives...
The Challenge: Many Remote Offices and Branch Offices (ROBOs) have deployed or are considering deployment of server virtualization to realize the benefits of improved cost, agility and availability. Trying to utilize internal disk drives and SSD that are packaged within the servers alone is not a good option, since...
As we reflect on the lessons learned through the data boom of 2013, we anticipate that in the coming year continued data growth will force enterprise organizations to rethink how to securely capture, store and retrieve data to derive more value from it. The amount of information being created by Internet-enabled devices and an increase in the number of business-critical applications being virtualized will contribute to this growth and...
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable. To combat this,...
As I write this, some of the country's brightest developers and practitioners of IT security are at the RSA Conference in San Francisco to discuss the newest techniques and technologies that - hopefully - will keep our networks and computer systems secure. For this article, though, I'd like to focus on where many organizations are falling short today...
These start-ups are focusing on security in cloud services and mobile devices.Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, Calif.-based Illumio, for example, founded earlier this year,...
You'd think by now that everyone knows that "password" and "111111" don't make for a secure password. Well, if they do, it seems they don't care. The list of the 25 most common (and worst) passwords of 2013 has been compiled by the folks at SplashData. And many of the usual suspects made the list - again...
When senior managers don't follow information-security policies, they set a dangerous and destructive tone. When an internal information breach happens, the perception may be it's the fault of lower-level staff ; yet senior managers, who have access to sensitive, unencrypted information,...
Storage in the enterprise is not simply about capacity - how many gigabytes or terabytes of data you can cram into your storage array. In today's online, virtualized, cloud-based world, storage is also about performance. How quickly can customers complete a purchase from your Web site? How long do employees have to wait for their virtual desktop to respond? How much latency can your customers tolerate when accessing cloud-based services?
The era of big data requires new storage strategies. And with faster and smarter technology, these approaches don't have to break the bank.Big data is nothing new to Quicken Loans. The nation's largest online retail mortgage lender is accustomed to storing and analyzing data from more than 1.5 million clients and home loans valued at $70 billion in 2012. But the big data landscape got a little more interesting for the Detroit-based company about three years ago.