opinion Why I’ve Turned Off iTunes Match On My iPhone CIO.com blogger James A. Martin gladly paid $25 for a year of Apple’s iTunes Match cloud-music locker service. But it didn't take long to regret the purchase. Here's why. By James A. Martin Jun 8, 2012 3 mins iPhone opinion Twitter Takes Flight: Behind Its New Logo If the Twitter bird looks a little different, it's not your imagination. This week, the social network launched a new logo. Here's the meaning behind it all. By Kristin Burnham Jun 8, 2012 2 mins Social Networking Apps Twitter opinion Cybersecurity News Roundup: Stolen Passwords; FBI and Stuxnet; Google and Gov’t Hacking This week's IT security roundup has news stories on a number of high-profile password thefts; an FBI investigation into who leaked confidential government data on cyberattacks on Iran; Android malware; and more.rn By Constantine von Hoffman Jun 8, 2012 3 mins Data Breach Malware Security news The World’s Best (and Worst) IT Cities to Work and Play Despite all the economic and political strife in the world, the globe-trotting techie still has opportunities for working at home and abroad — and even take in an adventure! For every hot spot, however, there's an evil twin nearby. Here are som By Tom Kaneshige Jun 8, 2012 6 mins Careers IT Jobs opinion Father’s Day Gift Guide: 8 Great Gadgets Father’s Day 2012 is right around the corner, and CIO.com gadget blogger Paul Mah wants to help you find the perfect gift. Check out this guide for a look at his favorite new electronics, all of which are sure to please the dad in your life. By Paul Mah Jun 8, 2012 4 mins Laptops Small and Medium Business Smartphones feature 15 open source big data technologies to watch Big data is making a big splash these days and open source technology is at the core of most of these big data initiatives. Here are 15 key open source big data technologies to keep an eye on. By Thor Olavsrud Jun 8, 2012 7 mins Big Data Open Source news 15 open source big data technologies to watch Big data is making a big splash these days and open source technology is at the core of most of these big data initiatives. Here are 15 key open source big data technologies to keep an eye on. By Thor Olavsrud Jun 8, 2012 8 mins Data Management Open Source news Flame’s Windows Update Hack Required World-Class Cryptanalysis, Researchers Say The Flame cyber-espionage malware makes use of a previously unknown cryptographic attack variant that required world-class cryptanalysis to develop, experts from the Dutch national research center for mathematics and computer science (CWI) said on Th By Lucian Constantin Jun 8, 2012 3 mins Encryption Malware Security feature Putting a Dollar Value on IT Outsourcing Contract Terms To make smarter decisions about how to set up your relationship with an IT service provider it is important to estimate the dollar value of the most important commitments, options and incentives clauses in an IT outsourcing contract. Here are some ty By Stephanie Overby Jun 8, 2012 6 mins Budgeting CIO IT Strategy news DreamWorks, HP Ring in Era of ‘Super Customer’ Most IT vendors use their annual conferences to tell attendees what customers are doing. This year HP brought DreamWorks, complete with Alex the Lion, on stage at Discover 2012 to discuss how HP's helping it realize the goal of real-time animati By Rob Enderle Jun 8, 2012 5 mins Collaboration Software IT Strategy Small and Medium Business news Apple Agrees to Pay Penalty Over 4G Ipad Claims in Australia The proposed penalty has been submitted to Australia's Federal Court for approval By Jeremy Kirk Jun 8, 2012 2 mins Computers and Peripherals Regulation news How Charles Dickens Helped Crack Your Linkedin Password Researchers are using words from classic novels to crack the LinkedIn password hashes By Jeremy Kirk Jun 8, 2012 4 mins Security feature Boeing Adopts Sci-Fi Data Manipulation Model Boeing's defense business wanted to interact with battle simulations using the same sort of gestures Tom Cruise used in the movie "Minority Report." Now sci-fi has come to life. By Stephanie Overby Jun 8, 2012 3 mins Business Intelligence feature Aetna Dumps Its Siloed Enterprise Architecture for SOA Aetna overcomes business hurdles to revamp its enterprise architecture By Stephanie Overby Jun 8, 2012 3 mins Business Intelligence Markets feature 6 Ways CIOs Can Make Peace with CMOs There's a natural tension between IT and marketing. But these days the CIO and CMO need to collaborate and focus on what's best for the customer. By Minda Zetlin Jun 8, 2012 13 mins CIO feature Why Marketing Turns to Rogue IT Hint: They want it done fast, and vendors are knocking on their door. Help them resist the temptations. By Minda Zetlin Jun 8, 2012 2 mins IT Strategy analysis CIOs Are Critical to Improving Customer Experience Forrester vice president Kyle McNabb advises CIOs to take a central role in improving customer experience and outlines what it takes to reclaim that role. By Kyle Mcnabb Jun 8, 2012 2 mins CIO CRM Systems opinion Can We Get A CIO-CMO Do-Over? CIO magazine's editor in chief discusses our June 15 cover story on the CIO-CMO relationship and why, despite the potential for animosity, there is a big benefit in learning to get along. By Maryfran Johnson Jun 8, 2012 3 mins CIO opinion How CIOs Can Help Build IT Talent for the Future Many in the US are concerned about the talent gap between American students and similarly-aged students overseas when it comes to math and science skills. This is a real problem for our economy and security. But CIOs can help by reaching out to guida By Gary Beach Jun 8, 2012 2 mins Mentoring feature How to Tell If IT and Markerting Have a Good Relationship Here are four signs of a successful CIO-CMO partnershipu2029 By Minda Zetlin Jun 8, 2012 2 mins CRM Systems Relationship Building opinion Google Gets Slick with Updated Search App for iPhones Web search on your iPhone has gotten easier. Google’s search app lets you enter queries via voice or typing, and it has a slick, easy-to-use interface that pulls up full-color images. By Bill Snyder Jun 8, 2012 3 mins Internet Small and Medium Business iPhone opinion Tiny $400 Audyssey Speaker for Apple Devices Packs Big Sound Despite its compact size, the Audyssey Audio Dock Air is an AirPlay-compatible speaker system for iPhones, iPad and iPods that delivers big sound and hefty bass. But it doesn't have a built-in dock, and it's pricey at $400. By Paul Mah Jun 7, 2012 4 mins Computers and Peripherals Wi-Fi opinion Are We Ready for the Windows 8 Tablet/Ultrabook Hybrid? Microsoft, Intel and hardware makers are betting big on the Windows 8 tablet/ultrabook hybrid. Though these devices offer advantages, their success will depend totally on whether the public embraces Windows 8, and that's not likely. By Shane O'Neill Jun 7, 2012 3 mins Laptops Small and Medium Business Tablets opinion Comparing Apple, Microsoft and BlackBerry Retail Stores A look inside Apple, Microsoft and BlackBerry brick-and-mortar stores provides insight into the three technology companies' retail strategies and target audiences. By Al Sacco Jun 7, 2012 2 mins Apple Laptops Small and Medium Business opinion 1.5M eHarmony Passwords Stolen Along With LinkedIn Data This week's high-profile LinkedIn-password hack just got more interesting; an additional 1.5 million passwords for online-dating site eHarmony were also apparently stolen and posted on a Russian forum for hackers. By Constantine von Hoffman Jun 7, 2012 2 mins Cybercrime Data Breach Data and Information Security news Apple’s WWDC 2012: Expect MacBook Refreshes, Siri Update Is a refresh of the MacBook Pro and Air coming? Will Apple go "broader" with Siri? What about Apple striking a deal with Facebook? Yes. Maybe. Probably not. By Tom Kaneshige Jun 7, 2012 3 mins MacBook Tablets iPhone feature 5 Google Calendar Tips and Tricks for Power Users Think you know everything Google Calendar has to offer? Here's a look at five little-known features to keep more you more productive and organized. By Kristin Burnham Jun 7, 2012 5 mins Internet Personal Software Social Networking Apps news Flame Authors Order Infected Computers to Remove All Traces of the Malware Flame self-desctruct module overwrites file data to prevent forensic analysis By Lucian Constantin Jun 7, 2012 3 mins Intrusion Detection Software Security how-to Rapid Application Development the Zappos Way Billion-dollar online shoe store Zappos, and CEO Tony Hsieh, embrace the motto of Delivering Happiness. Living up to that means maintaining a reliable website and giving employees free reign to solve problems. CIO.com recently visited Henderson, Ne By Matthew Heusser Jun 7, 2012 9 mins Agile Development Data and Information Security Retail Industry news Dating Site Eharmony Confirms Password Breach Password hashes for eHarmony were released on the same Russian forum which published the LinkedIn hashes By Jeremy Kirk Jun 7, 2012 2 mins Security tip How to Join the Strategic Inner CIO Circle Becoming a strategic CIO requires a clear vision, great communication skills and a reputation for managing change By Jack Bergstrand Jun 7, 2012 3 mins CIO tip How ComScore Is Using Hadoop to Tame Its Big Data Flow Market researcher ComScore tames a torrent of data with open-source analytics By Michael Ybarra Jun 7, 2012 3 mins Data Center Data Warehousing opinion Any.DO To-Do App for Android Makes Noteworthy iOS Debut Even if you're already using a to-do app on your iPhone or iPod touch, you'll want to check out Any.DO thanks to its slick interface and attractive price tag: Free. By James A. Martin Jun 6, 2012 3 mins iPhone news 10 Superhero Powers Every CIO Should Have These 10 super powers would make even the most beleaguered CIO an IT hero. Let's just hope they use their new-found power for tech good. By Jennifer Lonoff Schiff Jun 6, 2012 3 mins CIO IT Skills opinion If Only RIM’s New BlackBerrys Looked Like This… RIM would be wise to take note of these four BlackBerry concept renderings, even if some of the designs are more science fiction than reality. By Al Sacco Jun 6, 2012 2 mins Mobile Small and Medium Business Smartphones opinion Sneaking Android Malware Past Google’s ‘Bouncer’ Google's Bouncer Android-malware detection system isn't flawless, and two researchers have found ways to sneak malicious apps into the Google Play store by learning Bouncer's behavior and circumventing safeguards. By Al Sacco Jun 6, 2012 2 mins Mobile Security Small and Medium Business Smartphones opinion Facebook Chain Letters: Weak Link to Reality A chain letter sent to Facebook users urges you to repost the message or risk losing the rights to your own data. Yesterday, Facebook set the record straight. By Kristin Burnham Jun 6, 2012 3 mins Facebook Social Networking Apps news ‘LeakedIn’ Web App Checks for Compromised Linkedin Passwords It is believed millions of the LinkedIn password hashes have been cracked, putting users at risk By Jeremy Kirk Jun 6, 2012 4 mins Security feature Ease Big Data Hiring Pain With Cascading Finding developers with the skills to create MapReduce jobs in Apache Hadoop is challenging, but you can ease that hiring pain with Cascading, an open source Java application framework for building enterprise Big Data applications on Hadoop. By Thor Olavsrud Jun 6, 2012 5 mins Business Intelligence Developer Java news Linkedin Stops Collecting Calendar Meeting Notes Through its Mobile Apps LinkedIn updated its Android and iOS apps to no longer send calendar meeting notes back to its servers when calendar integration is enabled By Lucian Constantin Jun 6, 2012 3 mins Privacy Security Social Networking Apps news 6M LinkedIn Passwords Leaked: How to Change Your Password LinkedIn is investigating claims that more than 6 million user passwords were compromised. Here are step-by-step instructions for changing your account password. By Kristin Burnham Jun 6, 2012 2 mins Data Breach LinkedIn Privacy news Windows 8 Release Preview: Enterprise Features Worth Evaluating For CIOs deploying Windows 7, the Windows 8 Release Preview may be an afterthought. But tablet-friendly Windows 8 delivers security, networking and mobile features that enterprise IT should test now to implement later. By Shane O'Neill Jun 6, 2012 5 mins Encryption Laptops Small and Medium Business opinion New Thunderbolt Dock Adds Ports, Functionality to Your MacBook The recently announced Matrox DS1 docking station connects to your Thunderbolt-equipped MacBook or other ultraportable laptop and adds a variety of ports, including Ethernet, USB 2.0 and 3.0, DVI and audio in/out ports. By Paul Mah Jun 6, 2012 3 mins Computers and Peripherals Laptops MacBook opinion BlackBerry vs. iPhone: Is This Still a Question? Two years ago, I was blasted for predicting iPhone as the future winner. I hate to say I told you so. By Tom Kaneshige Jun 5, 2012 4 mins Consumer Electronics Smartphones opinion The Environmentally-Friendly iPad Case: Logitech Solar Keyboard Folio Logitech's environmentally-friendly Solar Keyboard Folio is both a case and a Bluetooth keyboard for your iPad tablet, and it doesn't need cables or electric power to charge. Unfortunately, the price tag is a bit of a turnoff. By Paul Mah Jun 5, 2012 4 mins Computers and Peripherals Tablets how-to 5 Best Ecommerce Software Platforms for Small Business Are you looking to expand your small business? For less than $100 per month, you can add ecommerce to your business website and reach new customers. By Vangie Beal Jun 5, 2012 7 mins E-commerce Software Retail Industry Small and Medium Business news Yahoo Implements Latest Antispam Defense Yahoo is rolling out the DMARC system this week, which helps email providers eliminate bogus messages By Jeremy Kirk Jun 5, 2012 2 mins Security news Facebook Joins Google, ISPs in Notifying DNSChanger Victims Facebook alerts owners of DNSChanger-infected computers that they need to take action before July 9 By Lucian Constantin Jun 5, 2012 2 mins Intrusion Detection Software Security Windows Security news Meet the 2012 CIO 100 Award Winners These 100 companies are being honored for distinguishing themselves by creating business value through the innovative use of IT By CIO staff Jun 5, 2012 2 mins Innovation news Researchers Find Ways to Bypass Google’s Android Malware Scanner Mobile security researchers devised methods that could allow Android malware to detect when it's being analyzed by Google's Bouncer system By Lucian Constantin Jun 5, 2012 3 mins Intrusion Detection Software Mobile Security Viruses 1…356357358359360361362363364…748 Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by Tanium Why people will always be the priority in a tech-driven world By TaniumSep 18, 20254 mins Business IT AlignmentDigital Transformation brandpost Sponsored by Tanium 5 steps to dodge budget surprises in your Windows 11 migration By TaniumSep 18, 20254 mins BudgetIT Strategy opinion IT operations career paths in the age of AI By Sean HeuerSep 18, 20257 mins Artificial IntelligenceCareersStaff Management podcast The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live podcast Why AI upskilling fails, and how tech leaders are fixing it | What IT Leaders Want, Ep. 11 Sep 12, 202528 mins CareersGenerative AI podcast CIO ASEAN Leadership Live with McKinsey: Transformative role of AI and GenAI in the insurance sector in Southeast Asia. By Estelle QuekSep 10, 202531 mins Artificial IntelligenceDigital TransformationInsurance Industry video The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live video How Sysdig Sage uses AI, agentic automation to quickly close cloud security gaps Sep 16, 202521 mins Cloud SecurityDevSecOpsThreat and Vulnerability Management video Why AI upskilling fails, and how tech leaders are fixing it | What IT Leaders Want, Ep. 11 Sep 12, 202528 mins CareersGenerative AI