how-to New Value From Commercial Innovation Aon's eSolutions subsidiary is creating internal benefits with products developed for external customers By CIO Executive Council May 30, 2012 3 mins CIO opinion Skills for the CIO Class of 2015 IT management is changing. Here are some of the types of experience and knowledge that companies will be looking for in their CIOs. By Martha Heller May 30, 2012 3 mins CIO Careers feature 10 Mobile Device Management Apps to Take Charge of BYOD Managing devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today. By Thor Olavsrud May 29, 2012 3 mins Enterprise Applications Mobile Small and Medium Business news 10 Mobile Device Management Apps to Take Charge of BYOD Managing devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today. By Thor Olavsrud May 29, 2012 3 mins Consumer Electronics Enterprise Applications Small and Medium Business opinion How To Choose the Right Tech Startup Partner CIOs look to IT startups for competitive advantage but finding the right newbie vendor is harder than you think. By Kim S. Nash May 29, 2012 3 mins Innovation Risk Management opinion Your Hair Tells a Story That Bits or Bytes Can’t In the age of big data, simple observation can be just as powerful. By Tom Kaneshige May 29, 2012 2 mins Data Center Smartphones opinion G-RAID Mini Offers Reliable Data Protection in a Portable Package The G-Technology G-RAID mini is a great-looking external-storage drive with two internal hard-disk drives to back up your data and help protect you from hard-disk drive failures. It's not cheap, but some unique data-protection features help just By Paul Mah May 29, 2012 3 mins Computers and Peripherals Laptops MacBook opinion Get Free Conference Calling for iPhone, Android with CrowdCall Most conference-call services aren't exactly easy to use. CrowdCall, a free app for iOS and Android, let’s you join hour-long conferences with as many as 20 people free of charge. By Bill Snyder May 29, 2012 4 mins Mobile Small and Medium Business iPhone opinion Surprise! EW’s Awesome Apps of Summer All iOS, Android When the average mobile-device user thinks of applications, they think of iOS and Android—not BlackBerry, Windows Phone or any other mobile platforms. Entertainment Weekly's new awesome apps of summer 2012 list is an effective represent By Al Sacco May 29, 2012 2 mins Small and Medium Business Smartphones iPhone news Romanian Authorities Dismantle Hacker Group Targeting Government Websites Romania's organized crime prosecutors detained 12 individuals suspected of hacking into official websites By Lucian Constantin May 29, 2012 3 mins Cybercrime Data Breach Intrusion Detection Software news New Federal Mobile IT Strategy Must Address Security As the White House rolls out an agenda to open and optimize government data for mobile devices and accelerate use of smartphones and tablets across departments and agencies, security expert warns that federal CIOs must address an array of vulnerabili By Kenneth Corbin May 29, 2012 6 mins Government Government IT Security news Researchers Identify Stuxnet-like Cyberespionage Malware Called ‘Flame’ Security researchers believe that a newly identified cyberespionage threat called Flame is even more complex than Stuxnet or Duqu By Lucian Constantin May 28, 2012 5 mins Intrusion Detection Software Malware Windows Security opinion Dangerous Dubai? There’s No App for That Mobile travel apps are all the rage, especially for destinations like Dubai. While they appeal to tourists, they don’t tell the whole story. By Tom Kaneshige May 25, 2012 3 mins Consumer Electronics Software Development opinion Timeline WWII App for iPad Brings That Epic War to Life The multimedia-rich Timeline World War 2 iPad app is perfect for Memorial Day remembrances. The software makes it easy to swipe through all of the battles, events and key figures. But it can't accurately convey the war's tremendous emotiona By James A. Martin May 25, 2012 2 mins Tablets opinion X-Rated Spam Coming to an Email Box Near You A nasty spambot called Cutwail is sending out porno spam in an effort to sell counterfeit pharmaceuticals. Clicking on it can turn your computer into a spam-spewing zombie. By Bill Snyder May 25, 2012 4 mins Browsers Malware Viruses opinion Sun Hardware ‘Blows,’ According to Oracle Internal Documents More precisely, Oracle said Sun hardware baaaallllloooooooows. That description comes from discovery documents released by HP related to ligation between the two tech giants. Columnist Rob Enderle says Oracle treated you and him like 'idiots.& By Rob Enderle May 25, 2012 5 mins Computers and Peripherals Legal Servers news Mayor of New Jersey Town Arrested on Hacking and Conspiracy Charges West New York mayor Felix Roque and his son are accused of hacking into a website that promoted his recalling from office By Lucian Constantin May 25, 2012 3 mins Cybercrime Data Breach Intrusion Detection Software news Untethered jailbreak for iOS 5.1.1 available for download Absitnthe 2.0 is the first untethered jailbreak available for the third-generation iPad By Loek Essers May 25, 2012 4 mins Mobile Security Security news Federal IT Reform Slower Than Claimed The efforts of U.S. President Barack Obama's administration to streamline and improve the government's IT systems aren't proceeding as quickly as officials have suggested, however, government auditors note steady progress as department By Kenneth Corbin May 25, 2012 4 mins CIO Government Government IT opinion Microsoft Goes on the Defensive It seems Microsoft can survive anything, even the post-PC shift. But recent anti-competitive tactics and petty fees reveal a nervous company. By Shane O'Neill May 24, 2012 3 mins Laptops Small and Medium Business Tablets opinion It’s Not Paranoia if Your Phone is Really Watching You Malware exists that lets Bad Guys hijack webcams and microphones. The U.S. government can't even do that yet, at least not legally, but it is working on it. Remember: It's not paranoia if they're actually after you. By Constantine von Hoffman May 24, 2012 5 mins Cybercrime Malware Privacy opinion Wireless Coverage in Stadiums Then and Now Just as cellular networks and mobile devices have drastically changed during the last ten years, so to have the systems and hardware wireless carriers use to bolster their cellular networks in high-traffic areas and event spaces. Here's a look a By Al Sacco May 24, 2012 2 mins Carriers Small and Medium Business Smartphones opinion The Crushing Weight of Apple Tim Cook and post-Jobs Apple must shake off their conservative coils with the upcoming iPhone, according to CIO.com's Tom Kaneshige By Tom Kaneshige May 24, 2012 2 mins Consumer Electronics IT Leadership iPhone opinion iPhone, Android, Symbian and BlackBerry: Google Searches Since 2004 A comparison of online searches for the terms "Android," "iPhone," "Symbian" and "BlackBerry" since 2004 and the latest mobile OS market share numbers provides some valuable insights. By Al Sacco May 24, 2012 2 mins Small and Medium Business Smartphones iPhone news Researchers Propose TLS Extension to Detect Rogue SSL Certificates TACK TLS extension combines public key pinning with self-generated keys to validate SSL certificates By Lucian Constantin May 24, 2012 4 mins Enterprise Applications Privacy Security news analysis Massive Layoffs at HP Make for IT Outsourcing Identity Crisis Major cutbacks at HP, at a time when its competitors are growing, raise questions about the company's IT services strategy for the future. Will it be a low-margin service provider or strategic business partner? By Stephanie Overby May 24, 2012 7 mins IT Strategy Outsourcing news Yahoo Leaks Private Key, Allows Anyone to Build Yahoo-signed Chrome Extensions Yahoo accidentally leaked the private key that was used to digitally sign its new Axis extension for Google Chrome By Lucian Constantin May 24, 2012 2 mins Browsers Encryption Internet news Security Researcher Urges IT Managers to Keep Up with SAP Patches Companies are vulnerable, but often don't realize they are By Loek Essers May 24, 2012 3 mins Data Breach Fraud Intrusion Detection Software news Broadband Stimulus Grants Seen as Political Flashpoint Lawrence Strickling, the lead administrator of the agency doling out stimulus money for broadband deployments, urges grant recipients to amplify success stories as program faces political persecution in election season. By Kenneth Corbin May 24, 2012 4 mins Financial Services Industry Government Regulation news Bug Bounty Hunters Reveal Eight Vulnerabilities in Google Services The two security researchers explained how they found so many bugs in such a short space of time By Loek Essers May 24, 2012 4 mins Intrusion Detection Software Security Windows Security opinion HomeSnap iPhone App Helps House Buyers, Sellers and Nosy Neighbors See a home you like? Just take a picture of it on your iPhone with HomeSnap to find out how much it’s worth, the square footage and more—even if the property isn’t for sale. The app is impressive, but you often have to dig By James A. Martin May 23, 2012 3 mins iPhone opinion Craigslist Users Beware: The Scammers Are After You Craigslist is full of great bargains; but it’s also full of scams. Selling my piano via the online marketplace made me a target. By Bill Snyder May 23, 2012 4 mins E-commerce Software Internet Security opinion Sanyo Eneloop: The Best Rechargeable Batteries for Your Gadgets Not all rechargeable AA or AAA batteries are created equal. CIO.com blogger Paul Mah has found what he thinks are the best rechargeable batteries in Sanyo's eneloop products. By Paul Mah May 23, 2012 3 mins Computers and Peripherals opinion How to Get Ice Cream Sandwich on Your Android Phone You don't have to wait for a wireless carrier or handheld maker to release Android 4.0 to get ice cream sandwich on your mobile device. Just follow these three simple steps. By Al Sacco May 23, 2012 1 min Developer Small and Medium Business Smartphones news Research Universities Secure $200M for Community Broadband Plan to bring ultra-fast gigabit broadband to universities and surrounding communities moves forward with partnership between Gig.U consortium and Gigabit Squared. By Kenneth Corbin May 23, 2012 5 mins Internet Networking news Bredolab Botnet Author Sentenced to 4 Years in Prison in Armenia He was found guilty of using the botnet to launch multiple DDoS attacks By Lucian Constantin May 23, 2012 2 mins Cybercrime Intrusion Detection Software Legal news Microsoft Takes Bing Streetside Offline in Germany After Privacy Complaints It remains unclear if and when the service will be reinstated By Loek Essers May 23, 2012 3 mins Internet Privacy how-to Beyond Templates: Building a Better Business Website Are you looking for a more robust and actionable business website? Here experts offer advice to help you move beyond a basic template-based business website. By Vangie Beal May 23, 2012 7 mins Retail Industry Small and Medium Business Web Development opinion Give Cyber Peace a Chance…But It Still Won’t Work Cybersecurity guru Eugene Kaspersky has called for an international cyber-weapons treaty because, he says, there's is no feasible way to defend all of our critical network infrastructure against cyber attacks. His reason sounds like a good one. By Constantine von Hoffman May 22, 2012 3 mins Browsers Servers news Youtube Appeals German Content Filtering Verdict Both YouTube and the music royalty collecting agency GEMA are appealing the verdict By Loek Essers May 22, 2012 3 mins Internet Legal news Banking Malware Monitors Victims By Hijacking Webcams and Microphones, Researchers Say The SpyEye variant secretly films and records what victims say and do when they are being defrauded By Lucian Constantin May 22, 2012 4 mins Data Breach Fraud Intrusion Detection Software opinion Uppidy Backs Up Texts to the Cloud…and That’s About It Uppidy.com and the associated Uppidy apps for Android and BlackBerry phones let you automatically back up text messages to the cloud. But the service’s iPhone support is off-putting to say the least, and its “live” message- By James A. Martin May 21, 2012 3 mins Smartphones iPhone opinion Is It Worth $99 to Have Microsoft Remove Bloatware from Your PC? PC makers lard up their machines with all sorts of trial programs you would never want. Now Microsoft is offering to get rid of it, for a fee. But it seems crazy to pay someone to remove software you never wanted in the first place. By Bill Snyder May 21, 2012 3 mins Laptops MacBook Small and Medium Business feature Mobile App Standoff: Web App Vs. Native App For resources-strapped companies that want to get in the mobile app game, a Web app tuned for smartphones and tablets is a wise choice. Just ask Texas insurance provider ANICO. By Tom Kaneshige May 21, 2012 4 mins Enterprise Applications news How AT&T Boosted Cell Coverage at Boston’s TD Garden (Video) TD Garden, home of the Boston Celtics and Bruins, just got a significant cellular facelift from wireless carrier AT&T. CIO.com's Al Sacco was on the scene to tour AT&T's brand new LTE-capable Distributed Antenna System (DAS), design By Al Sacco May 21, 2012 4 mins Carriers Small and Medium Business Smartphones how-to How to Advance Lean Software Development (Beyond the ‘Toyota Way’) The concept of lean software traces its origins to lean manufacturing and the Toyota Production System. Building software is much different than building a car, but lessons about reducing waste and achieving continuous improvement apply nonetheless. By Matthew Heusser May 21, 2012 9 mins Agile Development IT Governance Frameworks IT Strategy news Mobile App Standoff: Web App vs. Native App For resources-strapped companies that want to get in the mobile app game, a Web app tuned for smartphones and tablets is a wise choice. Just ask Texas insurance provider ANICO. By Tom Kaneshige May 21, 2012 4 mins Small and Medium Business Smartphones iPhone news Cross-browser Worm Spreads Via Facebook, Security Experts Warn Malware writers use Crossrider browser extension development framework to build Facebook worm By Lucian Constantin May 21, 2012 3 mins Browsers Intrusion Detection Software Security news Security: Prepared for the EU’s New Data Protection Regulation? As the U.K. prepares to begin enforcing its version of the European Union's E-Privacy Directive later this week, the 27-member nations of the E.U. are considering new draft legislation that would reform and harmonize data protection laws. By Thor Olavsrud May 21, 2012 12 mins Data and Information Security Government Legal feature 5 Tips for Social Business Adoption: How SAS Succeeded SAS needed a way to consolidate information repositories and wrangle millennials from using Facebook for work purposes. Here's how the business analytics company decided on and rolled out their enterprise collaboration platform, plus tips for su By Kristin Burnham May 21, 2012 6 mins CIO SaaS Social Networking Apps 1…358359360361362363364365366…748 Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by Tanium Why people will always be the priority in a tech-driven world By TaniumSep 18, 20254 mins Business IT AlignmentDigital Transformation brandpost Sponsored by Tanium 5 steps to dodge budget surprises in your Windows 11 migration By TaniumSep 18, 20254 mins BudgetIT Strategy opinion IT operations career paths in the age of AI By Sean HeuerSep 18, 20257 mins Artificial IntelligenceCareersStaff Management podcast The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live podcast Why AI upskilling fails, and how tech leaders are fixing it | What IT Leaders Want, Ep. 11 Sep 12, 202528 mins CareersGenerative AI podcast CIO ASEAN Leadership Live with McKinsey: Transformative role of AI and GenAI in the insurance sector in Southeast Asia. By Estelle QuekSep 10, 202531 mins Artificial IntelligenceDigital TransformationInsurance Industry video The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live video How Sysdig Sage uses AI, agentic automation to quickly close cloud security gaps Sep 16, 202521 mins Cloud SecurityDevSecOpsThreat and Vulnerability Management video Why AI upskilling fails, and how tech leaders are fixing it | What IT Leaders Want, Ep. 11 Sep 12, 202528 mins CareersGenerative AI