how-to Top 10 Enterprise Applications for Public Clouds Once you address security and privacy concerns, there are a number of applications, regardless of your business, which you can comfortably and safely move to the public cloud. By Nari Kannan Jun 21, 2012 7 mins CRM Systems Developer Project Management Tools news Patent Reform Law Will Benefit Tech Sector U.S. Patent and Trademark Office Director David Kappos says with the implementation of the America Invents Act well underway businesses in industries highly reliant on intellectual property, such as IT, can look forward to expedited reviews of their By Kenneth Corbin Jun 21, 2012 5 mins Government Intellectual Property Technology Industry news Google Project Aims to Document Endangered Languages Google has cooperated with universities and linguistic organizations to begin documenting approximately 3,500 languages that are at risk of disappearing in the next 100 years, the company said on Thursday. By Loek Essers Jun 21, 2012 2 mins Internet how-to Improve Cloud Support With a Customer Bill of Rights Cloud vendors are re-learning the lessons of client-server support in the 1990s, and it's not a nice walk down memory lane. It's time for a cloud customer Bill of Rights. By David Taber Jun 21, 2012 6 mins IT Strategy Project Management Tools SaaS news Researcher: Face.com iOS flaw could have allowed Facebook, Twitter account hijacking Face.com patched a vulnerability that could have allowed attackers to hijack the Facebook and Twitter accounts of its customers By Lucian Constantin Jun 21, 2012 2 mins Mobile Security Privacy Social Networking Apps opinion Should Companies Launch Counterattacks Against Hackers? It's the Wild West online, and there aren't enough lawmen to keep the Web safe for businesses. Some security experts think it's time for enterprises to go vigilante on the Bad Guys. Others say companies should just baffle 'em with By Constantine von Hoffman Jun 20, 2012 5 mins Cybercrime Data and Information Security Security opinion You Could Power Up Future Gadgets by Walking Are you sick of gadgets that run out of power at the most inopportune times? A technology that's currently being developed to harvest energy from your body movements could let you walk or run to juice up mobile electronics. By Paul Mah Jun 20, 2012 2 mins Computers and Peripherals feature 15 Social Media Scams From Facebook phishing lures to Twitter and Tumblr hoaxes, here are 15 scams to watch out for on social networking sites. By Joan Goodchild Jun 20, 2012 6 mins Data Breach Intrusion Detection Software Malware opinion Microsoft to Hardware Partners: Your Tablets Weren’t Good Enough Whether it's a temporary ploy or new business model, Microsoft's decision to brand its own Windows 8 tablets is a result of tablet hardware mediocrity. By Shane O'Neill Jun 20, 2012 3 mins Small and Medium Business Tablets Windows opinion Free MightyText App Brings iMessage-Like Features to Android MightyText for Android makes it easy to send and receive SMS messages on your computer using your Android phone. Unfortunately, the free service eats into your smartphone’s messaging plan and its MMS delivery needs work. By James A. Martin Jun 20, 2012 3 mins Smartphones news Apple Infringes on Samsung UMTS Patent, Dutch Court Rules Samsung lost two other infringement cases in The Hague today By Loek Essers Jun 20, 2012 4 mins Mobile Small and Medium Business news Ipad Customers Felt “short Changed” By Apple, Australian Judge Says An Australian judge approved a A$2.25 fine against Apple for misleading 4G claims By Jeremy Kirk Jun 20, 2012 2 mins Computers and Peripherals Legal Regulation news Surface vs. iPad: The Weight of the World on Microsoft Will Steve Ballmer risk it all in his quest to unmake the iPad? He has a chance, but Microsoft advertising must first forge a relentless attack on the iPad's weaknesses. By Tom Kaneshige Jun 20, 2012 5 mins Laptops Microsoft Office Office Suites news Unpatched Microsoft XML Core Services Flaw Increasingly Targeted in Attacks, Researchers Say Sophos discovers new compromised websites that exploit the CVE-2012-1889 MSXML vulnerability By Lucian Constantin Jun 20, 2012 2 mins Intrusion Detection Software Security how-to First Key to Agile IT Governance: Stakeholder Satisfaction If a company's employees and customers are happy with its approach to tech, then its shareholders are likely to be happy, too. CIOs can take simple measures to make sure that all stakeholders appreciate their IT investments and understand how be By Chiranjeev Bordoloi Jun 20, 2012 7 mins IT Governance IT Strategy Technology Industry news House Panel Condemns U.N. Internet Regulatory Plan In unanimous vote hailed by tech industry groups, committee members call on the Obama administration to resist efforts to empower United Nations with global Internet oversight authority in negotiations later this year. By Kenneth Corbin Jun 20, 2012 5 mins Government Regulation news Google “Surprised” by Revived U.K. Street View Investigation Google is "surprised" that the U.K. Information Commissioner's Office (ICO) reopened its investigation into the way the company's Street View cars gathered personal data from unencrypted Wi-Fi networks, the company said in a lette By Loek Essers Jun 20, 2012 3 mins Internet Legal Regulation news 5 Pros and Cons of Microsoft Surface Tablet The Microsoft Surface and Surface Pro tablets seem to strike a nice balance between work and play. However, Microsoft will need more than a built-in keyboard to woo iPad users. Oh, and then there's the risk that the device is a slap in the face By Jonathan Hassell Jun 20, 2012 7 mins Laptops Small and Medium Business Ultrabook feature 3 Ways You Can Be the Manager No One Wants to Leave The most common reason employees voluntarily leave their jobs is not the company or the work–it's the boss. The most decisive factor in employee retention is the quality of the employee-manager relationship. Here are three simple practices that By Bob Kantor Jun 20, 2012 8 mins Careers IT Jobs IT Skills news Report: Flame Part of US-Israeli Cyberattack Campaign Against Iran Unnamed Western officials confirmed that Flame was developed by US and Israeli governments, the Washington Post reported By Lucian Constantin Jun 20, 2012 2 mins Government Intrusion Detection Software opinion Verizon’s ‘Share Everything’ Plan: Think Twice Before You Opt In Verizon and others carries are making it more expensive to download data on your smartphone or tablet. Paying less for voice capacity that you probably won't use and more for data that you will use is a not a good trade. By Bill Snyder Jun 19, 2012 4 mins Carriers Small and Medium Business Smartphones opinion Corporate Cyber Attacks Slow Weapons Treaty Progress American businesses that launch counterattacks on hackers or others who target them online are hindering progress in enacting international weapons treaties. Here's why. By Constantine von Hoffman Jun 19, 2012 3 mins Cybercrime Intrusion Detection Software Security opinion Microsoft Pokes Its Partners With A Stick Named Surface — And That’s A Good Thing Why does Microsoft feel the need to compete with its most important partners? Here are three reasons that CIOs should tune into. By Forrester Research Jun 19, 2012 3 mins IT Leadership Tablets opinion In Social Business ‘Fast Is the New Strong’ The Enterprise 2.0 conference kicked off in Boston this morning with a series of keynotes. Here's what speed, fire and football have to do with it. By Kristin Burnham Jun 19, 2012 1 min Social Networking Apps opinion Microsoft Surface Tablet a Bold Break with Tradition With the historic but risky Surface Tablets, Microsoft now has its own iPad. But is Microsoft cut out to be like Apple? By Shane O'Neill Jun 19, 2012 3 mins Laptops Small and Medium Business Tablets news Researchers Set New Cryptanalysis World Record for Pairing-based Cryptography Researchers from Fujitsu Laboratories, Japan's National Institute of Information and Communications Technology (NICT) and Kyushu University have set a new cryptanalysis world record by cracking a 278-digit-long (923-bit) key used in a pairing-ba By Lucian Constantin Jun 19, 2012 2 mins Encryption news Fake Android Antivirus App Likely Linked to Zeus Banking Trojan, Researchers Say Cybercriminals are distributing a mobile component of the Zeus banking Trojan as an Android security application, Kaspersky experts said By Lucian Constantin Jun 19, 2012 3 mins Fraud Intrusion Detection Software Mobile Security how-to 6 Things You Need to Know About jQuery Bringing together HTML5 and CSS, the jQuery JavaScript library greatly eases the pains of Web application development. Learn how using jQuery can improve load time, SEO and multimedia on your website. And did we mention it's free? By Rich Hein Jun 19, 2012 8 mins Internet Java Web Development feature How Citibank Uses Twitter to Improve Customer Service Citibank knew younger customers were increasing turning to social media when they had business issues. By using a third-party application called LivePerson, the bank reached those customers where they were talking without compromising security. n By Lauren Brousell Jun 19, 2012 5 mins CRM Systems Financial Services Industry Twitter news Cloud Failures Cost More Than $70 Million Since 2007, Researchers Estimate The figures of the economic impact of cloud outages is probably underestimated, the researchers said. By Loek Essers Jun 19, 2012 3 mins Cloud Computing Enterprise Applications news Data Breach? Virtual Bounty Hunters Will Hunt it Down The security company CloudeyeZ is taking a new approach to helping companies manage data breaches By Jeremy Kirk Jun 19, 2012 3 mins Security opinion Smartphone Addiction: Why Are We Afraid of Being Alone? An overly connected mobile phone culture was on display at the U.S. Open last week. So what did my friend do? He unplugged on the Lost Coast. By Tom Kaneshige Jun 18, 2012 3 mins Consumer Electronics Smartphones opinion Bring Your Own… Communication? Communication options have exploded with the massive increase in mobile devices. While the standard phone call and text message definitely have their place, online communication channels are opening up new avenues for chatting. If you worry that this By Curt Finch Jun 18, 2012 3 mins BPM Systems Project Management Tools Small and Medium Business opinion New Lenovo Laptop Dock Supports Multiple Displays, USB 3.0 Lenovo's $180 ThinkPad USB 3.0 Dock is an excellent laptop dock that's perfect for use at home and in the office. The gadget supports two DVI displays, packs five USB 3.0 ports, a gigabit Ethernet port and a stereo microphone outlet, and de By Paul Mah Jun 18, 2012 3 mins Computers and Peripherals Laptops opinion Nivio Awkwardly Brings Office Apps to Android, iOS Nivio lets you "rent" desktop software to run on Windows, Mac, Android, and iOS devices, which is a cool concept, according to CIO.com blogger James A. Martin. But the service is complicated and frustrating. By James A. Martin Jun 18, 2012 4 mins Productivity Software Tablets opinion New Sonos Subwoofer Boosts Wireless Listening Experience Sonos promises to turn your living room into a home theater with its expensive line of high-end wireless speakers and amps. Now the company has cranked up the volume with Sonos Sub, a subwoofer that delivers rich, vibration-free bass. By Bill Snyder Jun 18, 2012 4 mins Computers and Peripherals Internet Small and Medium Business opinion Android Malware Scam Nets $265K, Lands IT Execs in Tokyo Jail Japan was recently the site of two high-profile Android security incidents, one of which landed a number of Tokyo-based IT executives in jail. By Al Sacco Jun 18, 2012 3 mins Malware Mobile Security Small and Medium Business news Data in Possible Credit Card Breach Appears to Be Old The data, linked to from Pastebin, includes, names, addresses and emails By Jeremy Kirk Jun 18, 2012 3 mins Security feature What You Really Need to Know About Cloud Security Cloud security breaches aren't necessarily headline news, but there's a good reason for that: Cybercriminals don't always view the cloud as the target of an attack, but often as a resource to launch an attack. By By Jeff Vance Jun 18, 2012 7 mins Cybercrime Data Breach Intrusion Detection Software feature Big Data for Marketing: Respect Consumer Privacy or Get Burned Marketers are increasingly looking to Big Data to provide the insight they need to create richer, more personalized and more targeted messaging for consumers. But collecting that data without making consumers leery of your brand requires data managem By Thor Olavsrud Jun 18, 2012 8 mins Business Intelligence CRM Systems Regulation news Attack Code Published for Two Actively Exploited Vulnerabilities in Microsoft Software Exploit modules for the CVE-2012-1875 and CVE-2012-1889 vulnerabilities were added to the Metasploit framework By Lucian Constantin Jun 18, 2012 2 mins Patch Management Software Security news Governments Should Invest More in Catching Cybercriminals, Researchers Say Investing in law enforcement action against cybercriminals is more important than buying cybersecurity software, researchers say By Lucian Constantin Jun 18, 2012 4 mins Cybercrime Government IT Security news Mozilla’s Concept Ipad Browser Eliminates the URL Bar, Tabbed Browsing Tablet browsing should be simple and fun and not feel like work, Mozilla developers said. By Loek Essers Jun 18, 2012 3 mins Browsers Developer news UK Attorney Says US Won’t Extradite Lulzsec Defendant Ryan Cleary's attorney said her client suffers from Asperger's syndrome and that extradition would be 'totally undesirable' By Jeremy Kirk Jun 17, 2012 2 mins Cybercrime Data Breach Data and Information Security opinion How Apple’s iOS Maps App Might Steer You Wrong During its recent WWDC keynote, Apple announced a new Maps app for iOS devices that's meant to replace Google Maps. The move makes sense for Apple, but will it be good for iOS users? By James A. Martin Jun 15, 2012 5 mins iPhone how-to Strategic Guide to Big Data Analytics Download CIO'com's ebook for advice about how to get started on exploiting the power of big data analytics, which can provide your organization with a competitive advantage. By CIO Staff Jun 15, 2012 1 min Business Intelligence Data Management Virtualization news analysis Why Your IT Outsourcing RFP Is Holding You Back The traditional request-for-proposal (RFP) process may be doing your IT outsourcing relationships a disservice. Enter request for solutions (or RFS), an open-ended, collaborative approach that's better for IT environments. By Stephanie Overby Jun 15, 2012 6 mins IT Leadership IT Strategy Outsourcing news VMware Patches Arbitrary Code Execution Flaw in Desktop, Server Virtualization Products Loading specially crafted virtual machine checkpoint files can result in the host system being compromised By Lucian Constantin Jun 15, 2012 2 mins Desktop Virtualization Patch Management Software Server Virtualization news Siri’s Steep (and Long) Learning Curve Siri, the iPhone's voice-enabled personal assistant, has a big problem: It doesn't really work the way Apple says it does. By Tom Kaneshige Jun 15, 2012 4 mins Car Tech Innovation iPhone news Will Windows 8 Be the Client OS That IT Loves Best? Speakers at Microsoft TechEd touted the virtues of the upcoming Windows 8. No surprise there — except the speakers were using Windows 8 on tablets, with nary a desktop in sight. Will the strength of Windows 8 on tablets finally get IT and end user By Rob Enderle Jun 15, 2012 5 mins Microsoft Office Mobile Security Small and Medium Business 1…354355356357358359360361362…748 Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by Tanium Why people will always be the priority in a tech-driven world By TaniumSep 18, 20254 mins Business IT AlignmentDigital Transformation brandpost Sponsored by Tanium 5 steps to dodge budget surprises in your Windows 11 migration By TaniumSep 18, 20254 mins BudgetIT Strategy opinion IT operations career paths in the age of AI By Sean HeuerSep 18, 20257 mins Artificial IntelligenceCareersStaff Management podcast The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live podcast Why AI upskilling fails, and how tech leaders are fixing it | What IT Leaders Want, Ep. 11 Sep 12, 202528 mins CareersGenerative AI podcast CIO ASEAN Leadership Live with McKinsey: Transformative role of AI and GenAI in the insurance sector in Southeast Asia. By Estelle QuekSep 10, 202531 mins Artificial IntelligenceDigital TransformationInsurance Industry video The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live video How Sysdig Sage uses AI, agentic automation to quickly close cloud security gaps Sep 16, 202521 mins Cloud SecurityDevSecOpsThreat and Vulnerability Management video Why AI upskilling fails, and how tech leaders are fixing it | What IT Leaders Want, Ep. 11 Sep 12, 202528 mins CareersGenerative AI