opinion Three Quick Tips for Presenting to the Board There's a right way and a wrong way to convey important information to your fellow executives. Our expert offers three things to keep in mind. By Lauren Brousell Jun 15, 2012 2 mins CIO opinion Cybersecurity News Roundup: LulzSec; Father’s Day Spam; and the ‘Do Not Kill’ Registry This week's IT security news roundup has stories on a new hacking group called LulzSec Reborn; a Tennessee-school-system data breach that exposed information on 110,000 people; a flood of Father's Day spam; and more. By Constantine von Hoffman Jun 14, 2012 3 mins Cybercrime Data Breach Security opinion LinkedIn Boosts Password Security but You Still Can’t Cure Stupid When it comes to passwords, companies like LinkedIn can hash and salt all they want but people will inevitably use insecure apps such as "123Password" and put themselves at risk. By Constantine von Hoffman Jun 14, 2012 3 mins Data Breach Data and Information Security Intrusion Detection Software opinion Chrome Replaces IE as World’s Most Popular Browser — Or Does It? The digerati hate Microsoft because it's soooo 2000. But as much as they would like it not to be true, Chrome is still far behind the despised IE in usage. By Bill Snyder Jun 14, 2012 4 mins Browsers Internet opinion DROID RAZR MAXX Tops iPhone on Verizon…but Not for Long Apple's iPhone is no longer the King of the Hill at Verizon Wireless, but the new top-selling Android-based DROID RAZR MAXX will likely fall behind the iPhone again later this year, when Apple is expected to unveil a 4G/LTE iPhone. By Al Sacco Jun 14, 2012 3 mins Carriers Small and Medium Business iPhone feature 10 Trends Driving Big Data in Financial Services When it comes to Big Data, the financial services sector has been somewhat slow on the uptake. Neil Palmer, partner of SunGard Consulting Services' Advanced Technology Business, explains it as a cautious approach to innovation driven by the heav By Thor Olavsrud Jun 14, 2012 3 mins Analytics Big Data Business Intelligence news 10 Trends Driving Big Data in Financial Services When it comes to Big Data, the financial services sector has been somewhat slow on the uptake. Neil Palmer, partner of SunGard Consulting Services' Advanced Technology Business, explains it as a cautious approach to innovation driven by the heav By Thor Olavsrud Jun 14, 2012 3 mins Analytics Big Data Business Intelligence opinion The Big Data Challenge: How to Develop a Winning Strategy Developing a winning Big Data strategy is challenging because it is as much about getting ahead of the trend and acquiring talent as it is about investing in new technology. To be successful you will need Data Scientists on your team, professionals w By Howard Elias, EMC Information Infrastructure and Cloud Services Jun 14, 2012 7 mins Business Intelligence Careers Data Management opinion How CIOs Can Get More From the Cloud Enterprise IT leaders are increasingly embracing cloud services. In order for these services to be successful, however, business and IT need to communicate and collaborate. Forrester Research's James Staten explains how CIOs can make the cloud r By James Staten Jun 14, 2012 4 mins CIO IT Strategy SaaS opinion 5 Ways Cloud Computing Is Like Open Source A decade ago, most IT departments denounced open-source software. Now they embrace the way that open source encourages innovation while saving money. The furor over cloud computing shows that history is repeating itself. The outcome should be the sam By Bernard Golden Jun 14, 2012 10 mins Developer Innovation Server Virtualization how-to Floating Customer Master Data into the Clouds The problem of a customer master database that holds the core of your company's customer data is as old as distributed software. The cloud adds some new twists to this issue and offers a new strategy for solving it. By David Taber Jun 14, 2012 5 mins CRM Systems Cloud Computing E-commerce Software news 64-bit Operating Systems, Virtualization Software Vulnerable to Privilege Escalation Attacks on Intel CPUs Attackers can exploit an Intel CPU-dependent vulnerability to escape virtual machines or gain kernel privileges By Lucian Constantin Jun 14, 2012 2 mins Desktop Virtualization Patch Management Software Small and Medium Business news Alleged Lulzsec Member, Ryan Cleary, Indicted in U.s. Cleary, already charged in the U.K., is accused of attacking Sony Pictures and Fox Entertainment By Jeremy Kirk Jun 14, 2012 3 mins Cybercrime Legal Security news Tech Logos: The Stories Behind the Designs When Twitter tweaked its blue bird, the design world was atwitter (pun intended). We spoke with Silicon Valley graphic designer Steve Yamaguma of Design2Market to get his insights into a few familiar tech logos. More goes into design than most people By Tom Kaneshige Jun 13, 2012 7 mins Facebook IT Strategy Twitter opinion Sweden Teaches Us How Not to Do Social Media Sweden's unique and controversial Twitter experiment has drawn thousands of followers for all the wrong reasons. Businesses: Don't let this happen to you. By Kristin Burnham Jun 13, 2012 3 mins Social Networking Apps Twitter opinion Father’s Day E-Reader Showdown: B&N Nook or Amazon Kindle? If you’re planning to buy Dad an e-reader this Father’s Day, you’ve got some decisions to make. CIO.com blogger James A. Martin offers guidance on five of the most important choices. By James A. Martin Jun 13, 2012 5 mins Computers and Peripherals Tablets opinion New Technology Brings Physical Buttons to Touch Screens Tactus Technology has developed a new system that uses fluids to create physical “keys” on touch screens. The technology could make its way to smartphones, tablets, laptops and many more gadgets in the coming years. By Paul Mah Jun 13, 2012 2 mins Computers and Peripherals Mobile Small and Medium Business opinion PlayBook Tablet Runs BlackBerry, Android and…iOS Apps A software developer has reportedly discovered a way to run some Apple iOS applications on the BlackBerry PlayBook, making RIM's device the only tablet that can run BlackBerry, Android and iOS mobile apps. By Al Sacco Jun 13, 2012 2 mins Small and Medium Business Smartphones iPhone how-to 8 Reasons to Gear Up For HTML5 Now The W3C won't finalize the latest iteration of HTML until 2014, but there are plenty of reasons, from better video to cleaner code to improved user interaction, to incorporate HTML5 into current Web development projects. By Rich Hein Jun 13, 2012 10 mins Internet Social Networking Apps Web Development news How the U.S Can Avoid a ‘Cyber Cold War’ Former White House Cybersecurity Chief Howard Schmidt discusses the challenges of combating cyber threats on a global scale and efforts currently in play towards cybersecurity legislation on the domestic front. By Kenneth Corbin Jun 13, 2012 5 mins Cybercrime Government Regulation news Windows To Go: The Do’s and Don’ts New Windows 8 enterprise feature, Windows To Go, allows you to boot up a real version of Windows 8 on any PC running Windows 7 or higher using a USB thumb drive. Here's what else you need to know. By Shane O'Neill Jun 13, 2012 4 mins Encryption Laptops Small and Medium Business feature Why CXM Is the Next Step in Customer Interaction Experts explain the difference between customer relationship management (CRM) and customer experience management (CXM) and describe how–and why–you need to create a positive customer experience. By Jennifer Lonoff Schiff Jun 13, 2012 6 mins CRM Systems IT Strategy Innovation news What Not to Like About Apple’s New MacBook Pro, iOS Maps App Is the non-upgradeable new MacBook Pro too expensive? If Apple stumbles with its new Maps App, will customers jump to Android? Mac Pro users ask: Apple, why hast thou forsaken me? CIO.com has a busy WWDC covered. By Tom Kaneshige Jun 13, 2012 4 mins Computers and Peripherals MacBook iPhone news Exploit Available for Root-access Vulnerability in F5 Networks Products Hackers can use a leaked SSH key to obtain root access on many F5 networking appliances By Lucian Constantin Jun 13, 2012 2 mins Computers and Peripherals Networking Patch Management Software news 3 Things You Need to Know About How LinkedIn’s Calendar Works Reports last week revealed that LinkedIn collects meeting information –including phone numbers and sensitive meeting notes — if you turn on the iOS app's calendar feature. LinkedIn sets the record straight, making three important clarification By Kristin Burnham Jun 13, 2012 3 mins Data Breach Data and Information Security LinkedIn news Merchant Information May have Been Stolen From Global Payments Hackers had access to servers hosting personal information of merchant applicants, Global Payments said By Lucian Constantin Jun 13, 2012 2 mins Data Breach Security opinion 5 Things Microsoft Doesn’t Want You to Know Microsoft is trying to move toward the cloud while propping up Windows, Office and other client-based money-makers. As the software giant moves in those two directions, Jonathan Hassell offers his list of five things Microsoft would rather not talk a By Jonathan Hassell Jun 13, 2012 7 mins Cloud Computing Small and Medium Business Windows news Does VMware Move Signal That Big Data Is Ready for Prime Time? Deploying, configuring and maintaining Hadoop clusters is challenging and time-intensive, but VMware aims to change that with a new open source project that virtualizes the Hadoop cluster and makes it ready for the cloud. By Thor Olavsrud Jun 13, 2012 3 mins Business Intelligence Server Virtualization System Management news Power and Ego, Not Money, May have Fueled Alleged Dutch Hacker David Benjamin Schrooten, now in U.S. custody, indicated he wanted to come clean, a computer security expert said By Jeremy Kirk Jun 13, 2012 5 mins Cybercrime Legal Security opinion Why CIOs Must Master the Art of Hiring Talent management is a critical skill for CIOs now and will soon be indispensable for setting up IT outposts globally. Here are some expert tips for excelling as a global talent scout. By Kim S. Nash Jun 12, 2012 2 mins CIO IT Jobs IT Leadership opinion Lamborghini Android Phone Even More Hideous Than Porsche BlackBerry Lamborghini in August will release a $2,725 Android smartphone with crocodile-skin trim, along with a $2,280 Android tablet that runs an outdated software version. But why would anyone actually buy these gaudy mobile devices? By Al Sacco Jun 12, 2012 2 mins Small and Medium Business Smartphones Tablets news Flame Crypto Attack Was Very Hard to Pull Off, Security Researcher Says The MD5 collision attack carried out by Flame's authors took more attempts to pull off than the RapidSSL one in 2008 By Lucian Constantin Jun 12, 2012 3 mins Encryption Intrusion Detection Software Security news Online Marketers Need to Police Privacy Before the Feds Step In When it comes to marketing practices, businesses must adopt a more serious approach to protecting consumer privacy via meaningful industry self-regulation. If they don't, it's likely that there will be more rigorous oversight of the industr By Kenneth Corbin Jun 12, 2012 3 mins Government Marketing Regulation news Dell ‘Super Excited About Windows 8,’ Vows No Dell Smartphones Michael Dell talks plans for a bevy of mobile device to launch with Windows 8, weighs in on company's strategy for security, cloud computing. By Kenneth Corbin Jun 12, 2012 4 mins Small and Medium Business Smartphones Ultrabook news Microsoft Q&A: With Windows 8, the Choice Is Yours Day two at Microsoft TechEd 2012 was all about Windows 8. CIO.com caught up with Windows corporate VP Antoine Leblond, who discussed why CIOs should test Windows 8, why developers should love it, and why we'll all be touching our laptop screens By Shane O'Neill Jun 12, 2012 7 mins Encryption Laptops Small and Medium Business how-to Hollywood’s Elite Data Centers Must Deliver Star IT Performances Some companies need data centers capable of sending and receiving petabytes' worth of data. Others require reliable connections to sites half a world away. Others still must scale up, then down, at a moment's notice. The firms that help By John Brandon Jun 12, 2012 8 mins Data and Information Security Servers Virtualization news If Megaupload Users Want Their Data, They’re Going to have to Pay The U.S. government says it doesn't have the data and isn't opposed to users retrieving it By Jeremy Kirk Jun 12, 2012 3 mins Internet Legal opinion Customer service: IT’s war! By Eric Berridge Jun 12, 2012 4 mins IT Leadership opinion 3 Ways to Get Microsoft Office on Your iPad, Android Tablet Check out these three cloud-based services that enable you to use Office apps on your iPad or Android tablet. Each service offers something different, but CIO.com blogger James A. Martin likes one in particular. By James A. Martin Jun 11, 2012 4 mins Tablets opinion Why Bill Gates is a Real Hero, Not Steve Jobs Steve Jobs was a great CEO, but Bill Gates and his charitable foundation transcend technology; Gates is trying to save the world. By Bill Snyder Jun 11, 2012 4 mins Small and Medium Business Windows iPhone opinion Flame Malware Made in the USA (We’re No. 1! We’re No. 1!) So what if the U.S. critical-utilities infrastructure is less secure than a child's piggy bank? So what if our government’s defense and intelligence networks are more compromised than a herd of Kardashians? Americans made the Ferrari of By Constantine von Hoffman Jun 11, 2012 3 mins Malware Security news Dutch Citizen Charged with Fraud, Identity Theft in Hacking Case David Benjamin Schrooten was extradited from Romania to the U.S. in March By Jeremy Kirk Jun 11, 2012 2 mins Cybercrime Fraud Legal feature Big Data Problem Plagues Government Agencies Government agencies are collecting vast amounts of data, but they're struggling just to store it, let alone analyze it to improve efficiency, accuracy and forecasts. By Thor Olavsrud Jun 11, 2012 5 mins Business Intelligence Government Government IT news MySQL Vulnerability Allows Attackers to Bypass Password Verification Exploit code is available for a MySQL authentication bypass vulnerability By Lucian Constantin Jun 11, 2012 3 mins Data Management Patch Management Software Security news Security Researchers Discover Link Between Stuxnet and Flame Security researchers from antivirus vendor Kaspersky Labs have found evidence that the development teams behind the Flame and Stuxnet cyberespionage threats collaborated with each other. By Lucian Constantin Jun 11, 2012 3 mins Intrusion Detection Software Security how-to Can You Top the Federal Digital Strategy? The United States government has an ambitious, four-part plan to not only use the latest, greatest, most secure and most interoperable tech, but also to use that tech to stay in touch with its citizens. Enterprises in need of a 21st century digital By Jason Bloomberg Jun 11, 2012 1 min Government Government IT IT Strategy news European League of Legends Game Players have Their Account Data Compromised League of Legends developer notifies users that hackers have breached its European databases By Lucian Constantin Jun 11, 2012 3 mins Data Breach Encryption Security tip 5 Things CIOs Need to Know About Privacy Policy Technology and government policies and regulations are constantly in flux. Here are 5 tips to help CIOs stay in compliance and avoid getting into hot water with the FTC like MySpace did. By Lauren Brousell Jun 11, 2012 3 mins Regulation opinion Hands On with Jawbone’s Next-Gen ‘Big Jambox’ Wireless Speaker If Jawbone's original Jambox Bluetooth wireless speaker didn't pack enough punch, you'll want to check out the brand new Big Jambox, a much larger–and louder–version of the company's portable speaker. CIO.com blogger Paul Mah sp By Paul Mah Jun 11, 2012 5 mins Computers and Peripherals Mobile Small and Medium Business opinion Cisco Cius Death Another Affirmation of BYOD BYOD has killed the Cisco's Cius tablet, putting the final nails in the coffin of the "enterprise-only" mobile device. By Shane O'Neill Jun 8, 2012 3 mins Small and Medium Business Smartphones Tablets 1…355356357358359360361362363…748 Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by Tanium Why people will always be the priority in a tech-driven world By TaniumSep 18, 20254 mins Business IT AlignmentDigital Transformation brandpost Sponsored by Tanium 5 steps to dodge budget surprises in your Windows 11 migration By TaniumSep 18, 20254 mins BudgetIT Strategy opinion IT operations career paths in the age of AI By Sean HeuerSep 18, 20257 mins Artificial IntelligenceCareersStaff Management podcast The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live podcast Why AI upskilling fails, and how tech leaders are fixing it | What IT Leaders Want, Ep. 11 Sep 12, 202528 mins CareersGenerative AI podcast CIO ASEAN Leadership Live with McKinsey: Transformative role of AI and GenAI in the insurance sector in Southeast Asia. By Estelle QuekSep 10, 202531 mins Artificial IntelligenceDigital TransformationInsurance Industry video The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live video How Sysdig Sage uses AI, agentic automation to quickly close cloud security gaps Sep 16, 202521 mins Cloud SecurityDevSecOpsThreat and Vulnerability Management video Why AI upskilling fails, and how tech leaders are fixing it | What IT Leaders Want, Ep. 11 Sep 12, 202528 mins CareersGenerative AI