IT

  • Most Topular Stories

  • 30% Of Companies Would Pay Ransoms To Cybercriminals

    Dark Reading:
    Sara Peters
    31 Mar 2015 | 1:10 pm
    Factor in under-reporting and the growing sophistication of ransomware -- like PacMan's social engineering scheme -- and the number might be higher.
  • Healthcare Is Ignoring Cyber Risk Intel, Academia Even Worse

    Dark Reading:
    Jason Polancich
    31 Mar 2015 | 8:45 am
    Healthcare and other sectors are indolently ignoring the process of gathering and using high-level intelligence to focus cyber defenses. Here's proof.
  • What's Hot In Networking: 7 Key Trends

    Network Computing:
    Marcia Savage
    31 Mar 2015 | 5:08 am
    From SDN and network automation to IPv6 and 802.11ac, the big trends in the networking industry demand your attention, and you can find them at Interop Las Vegas.
  • VMware VSAN: Reality Vs. Hype

    Network Computing:
    Jim O'Reilly
    1 Apr 2015 | 5:00 am
    VMware's Virtual SAN is touted for its performance, lower cost and scalability, but emerging trends such as white-box storage undercut those claims.
  • TIDAL High Fidelity Music Streaming Service Launches in Malta

    itnews.com.mt
    Jesmond Darmanin
    22 Mar 2015 | 1:27 pm
    TIDAL, a company that offers High Fidelity lossless music streaming service with HD music videos, has announced the launch and availability of its service in Malta. The ideal music service for those who care about quality, TIDAL welcomes the Maltese to enjoy its extensive library of 25 million-plus tracks, 75,000 music videos, and curated editorial articles, features and interviews written by experts. Ad free and available now for a monthly subscription of €13.99, visit www.tidalhifi.com or download the app from iTunes App Store or the Google Play Store. “Europe, as the rest of the…
  • add this feed to my.Alltop

    Network Computing:

  • VMware VSAN: Reality Vs. Hype

    Jim O'Reilly
    1 Apr 2015 | 5:00 am
    VMware's Virtual SAN is touted for its performance, lower cost and scalability, but emerging trends such as white-box storage undercut those claims.
  • Legacy IT Vendors & The AWS Fear Factor

    Colm Keegan
    1 Apr 2015 | 4:00 am
    The popularity of Amazon Web Services, along with SaaS, means that traditional IT vendors must transform themselves in order to remain relevant in the new cloud era.
  • What's Hot In Networking: 7 Key Trends

    Marcia Savage
    31 Mar 2015 | 5:08 am
    From SDN and network automation to IPv6 and 802.11ac, the big trends in the networking industry demand your attention, and you can find them at Interop Las Vegas.
  • Security Breaches Keep Network Teams Busy

    Marcia Savage
    30 Mar 2015 | 6:00 am
    Network Instruments study shows that network engineers are spending more of their day responding to breaches and deploying security controls.
  • SDS & Hyperconvergence: Sense & Nonsense

    Howard Marks
    30 Mar 2015 | 5:00 am
    Howard Marks uncovers the meaning behind software-defined storage, how hyperconvergence fits in, and where these technologies make sense -- and don't.
 
  • add this feed to my.Alltop

    itnews.com.mt

  • TIDAL High Fidelity Music Streaming Service Launches in Malta

    Jesmond Darmanin
    22 Mar 2015 | 1:27 pm
    TIDAL, a company that offers High Fidelity lossless music streaming service with HD music videos, has announced the launch and availability of its service in Malta. The ideal music service for those who care about quality, TIDAL welcomes the Maltese to enjoy its extensive library of 25 million-plus tracks, 75,000 music videos, and curated editorial articles, features and interviews written by experts. Ad free and available now for a monthly subscription of €13.99, visit www.tidalhifi.com or download the app from iTunes App Store or the Google Play Store. “Europe, as the rest of the…
  • Microsoft Vice-President of Education To Visit Malta

    Jesmond Darmanin
    20 Mar 2015 | 12:06 pm
    ANTHONY SALCITO, Vice-President of Education for Microsoft Corporation’s Worldwide Public Sector will be visiting Malta this coming Monday 23rd March. Besides meeting Microsoft Malta’s team and visiting the Microsoft Innovation Center, Mr Salcito will also visit Stella Maris College which this year is one of Microsoft’s Lighthouse Schools following a successful pilot project hosted by Microsoft and Maltese company Smart Technologies. Schools join Microsoft’s Lighthouse program when they would have shown particular effort in fostering a digital learning environment through the…
  • ICT Solutions attain HP EG Storage Specialist Certification

    Jesmond Darmanin
    14 Mar 2015 | 7:37 am
    ICT Solutions, a Malta-based systems integrator, has been awarded EG Silver Storage Specialist Partner Status by HP. The appointment is the result of the attainment of all the required training, accreditation and certification achieved by ICT Solutions’ commercial and engineering teams. Commenting about the achievement, ICT Solutions’ Manager for Commercial Services Liam Pace, stated that “ICT Solutions has over the years built a specific focus on server and storage solutions, and we felt that now was the time to continue to formalise our position in the market as a leading HP partner.
  • Maltese iOS and Android Apps list

    Jesmond Darmanin
    27 Jan 2015 | 1:52 am
    The Maltese app market is growing quickly and steadily, and for this reason, we decided to create this post to include the applications that we find that are created by Maltese developers. If you have created an app and you want it to be listed here, or you discovered/use any other Maltese app that is not listed below, let us know. If you find any broken links, please let us know too. 2x MDM – Mobile Device Manager - http://www.2x.com/mdm/mobile-device-management/ Maltese Traffic App – http://www.maltesetraffic.com/app.php  Visit Malta…
  • WhatsApp comes to the desktop

    Jesmond Darmanin
    22 Jan 2015 | 1:42 am
    The new desktop oriented WhatsApp has now been released as a companion web app for Chrome (not a stand-alone). WhatsApp web version mirrors your conversations and messages from your mobile device, and requires you to scan a QR code on your computer via your phone in order to get started. What this means is that if your phone isn’t working (dead, off, etc), WhatsApp won’t work for you on the desktop. Although it would be nice if the experience wasn’t so tied to your phone, this is still a very welcome addition for WhatsApp fans looking to use their computer’s full-sized keyboards to…
  • add this feed to my.Alltop

    DIGITIMES: IT news from Asia

  • Foxconn automated lines in eastern China increase production value, says report

    1 Apr 2015 | 1:05 am
    Foxconn Electronics has introduced robots to automated production lines at its factory in Kunshan, eastern China, reducing labor from 80,000 workers to 40,000 and doubling its production value, according to a Chinese-language Xinhuanet report.
  • Growth of solar and wind industry to increasingly rely on IoT-based technologies and services, says ABI Research

    1 Apr 2015 | 12:59 am
    According to ABI Research, growth of the solar and wind industry will increasingly rely on adoption of IoT-based technologies and services. ABI Research expects IoT connected wind and solar installations to grow at a CAGR of 21% between 2014-2020 with the total number of connections growing from the almost two million in 2014 to 6.3 million in 2020.
  • Wistron invests in Arbor Technology

    1 Apr 2015 | 12:20 am
    Wistron has announced an investment of NT$246 million (US$7.8 million) in Arbor Technology for a 10.69% stake to become the largest corporate shareholder. Arbor makes industrial embedded/networking computing devices and ruggedized computing devices.
  • Samsung expected to delay second round of investment for expanding flexible display

    31 Mar 2015 | 11:43 pm
    Samsung Display is expected to delay a second round of investment for expanding flexible display production at its A3 facilities due to reported restructuring in production and materials, according to Korea-based ET News.
  • Commentary: China moves step forward to developing DRAM technology with ISSI buyout

    31 Mar 2015 | 11:36 pm
    China imports up to US$200 billion worth of chips a year, an amount which is higher than comparable figures for imports of crude oil and raw materials. Since memory chips account for a high portion of its total IC imports, it offers a good reason for China-based Summitview Capital and other investors to acquire US-based DRAM design company Integrated Silicon Solution (ISSI). More essentially, the deal will fulfill China's long-term goal to build up technology related to memory chip production.
 
 
  • add this feed to my.Alltop

    Computer Security News

  • China suspected as software site GitHub hit by attack

    30 Mar 2015 | 8:10 pm
    The software collaboration website GitHub said Monday it was fighting off a cyber attack since late last week, and security analysts said the effort appeared to originate in China. A US website described as "the world's largest code host," GitHub said it first noticed the so-called distributed denial of service attack Thursday, with intermittent disruptions over the past few days.
  • Delaware's "Computer Security Breaches" Law Needs an Overhaul

    30 Mar 2015 | 6:05 pm
    I suspect this may surprise most Delawareans. In 2005, Delaware Governor Ruth Ann Minner signed into law House Bill 116.
  • NA body directs Sindh police to reinvestigate cases against MNA : March 30, 2015,

    30 Mar 2015 | 9:40 am
    ISLAMABAD A sub-committee of the National Assembly's standing committee on rules of procedure and privileges on Monday directed for reinvestigation of cases against MNA Syed Ayaz Ali Shah Sherazi and his family members by a senior police officer. The committee, which met with Muhammad Ali Rashid in the chair, discussed privilege motions of member of National Assembly MNA Syed Ayaz Ali Shah Sherazi against alleged misbehaviour of Thatta Senior Superintendent of Police Fida Mastoi and raid by a police party led by Mirpur Deputy Superintendent of Police Manzoor Panwar.
  • Taiwan seeks stronger cyber security ties with U.S. to counter China threat

    30 Mar 2015 | 5:42 am
    Taiwan wants to join a major anti-hacking drill conducted by the United States to strengthen cyber security ties with its staunchest ally, its vice premier said on Monday, a move which would help safeguard against constant targetting by hackers in rival China. Many hacks into Taiwan systems have been traced to sites belonging to China's People's Liberation Army, Vice Premier Simon Chang told Reuters in an interview, without elaborating on the locations.
  • Cyber attack disrupts access to Rutgers University network

    30 Mar 2015 | 4:36 am
    In an email to students, Rutgers Chief Information Officer Don Smith said a "distributed denial" of service" disrupted access for off-campus users. But the email said Rutgers has not detected any "breach of confidential information."
  • add this feed to my.Alltop

    IT security news - Google News

  • Chibok residents cheers Jonathan's exit, having voted for security - Al Jazeera America

    1 Apr 2015 | 5:00 am
    Al Jazeera AmericaChibok residents cheers Jonathan's exit, having voted for securityAl Jazeera AmericaCHIBOK, Nigeria — In Chibok, the village in northeastern Nigeria's restive Borno state that is still suffering the loss of more than 200 schoolgirls who were abducted last year by the armed group Boko Haram, some voters traveled hundreds of miles to Analyst Predicts Security Revamp After Buhari VictoryDeutsche WelleBuhari Urged to Focus on Electricity, Security, Job CreationTHISDAY LiveNigeria Election Becomes a Referendum on SecurityWall Street Journaleuronewsall 5,686 news…
  • The easy Java and Flash security fix everyone hates to do - PCWorld

    1 Apr 2015 | 3:30 am
    PCWorldThe easy Java and Flash security fix everyone hates to doPCWorldIn 2013, Java was the most popular target of attackers, but in 2014, the number of attacks attempting to exploit the software declined by a third, according to Cisco's 2015 Annual Security Report. A survey of exploit kits by security software firm
  • San Jose airport suffers fifth security breach in less than one year - San Jose Mercury News

    31 Mar 2015 | 9:07 pm
    NBC Bay AreaSan Jose airport suffers fifth security breach in less than one yearSan Jose Mercury NewsIn August, notorious stowaway Marilyn Hartman was able to bypass security at the airport and get on an airplane that flew to Los Angeles before she was discovered. In November, Miguel Zaragoza was detained after he was caught trespassing on the Woman Arrested After Security Breach at Mineta San Jose International Airport NBC Bay AreaWoman arrested after latest San Jose Airport security breachKTVU San FranciscoWoman arrested following security breach at San Jose airportKRON4.comall 14 news…
  • US releases military aid to Egypt, cites national security - Fox News

    31 Mar 2015 | 6:17 pm
    Christian Science MonitorUS releases military aid to Egypt, cites national securityFox NewsInstead, the U.S. said it is maintaining that the aid is in the interest of U.S. national security. The White House said Obama, during his call to el-Sissi, "explained that these and other steps will help refine our military assistance relationship so US cites national security in resumed weapons flow to EgyptChristian Science Monitorall 617 news articles »
  • New Cadillac with nifty security feature unveiled - CNNMoney

    31 Mar 2015 | 5:51 pm
    CNNMoneyNew Cadillac with nifty security feature unveiledCNNMoneyThey're also attached to security sensors so if the car is moved or any window glass is broken, which would set off the alarm, a series of photos is taken all around the car. The images are stored within the car and can be accessed later using a memory and more »
  • add this feed to my.Alltop

    Oracle Bloggers

  • HR Tech: Zwei lange Tage Demos, Diskussionen, Visionen und … viel Spass

    User12046154-Oracle
    1 Apr 2015 | 3:39 am
    Autor: Joachim Skura, Sales Development Manager Human Capital Management, Oracle DeCH “ London‘s calling…”, wer folgt diesem Ruf nicht gerne? Zumal die HR Tech der renommierteste Event in Europa ist, wenn es um die Schnittstelle von HR und IT geht. Die vergangenen beiden Male fand sie in Amsterdam statt. Vor kurzem hat man sich jedoch entschlossen, dem europäischen Gedanken Rechnung zu tragen und die Veranstaltung durch Europa touren zu lassen.1.500 Besucher konnten am 24. und 25. März in der britischen Hauptstadt zwei Tage lang erstklassige Vorträge hören, bei den einschlägigen…
  • Patch Set Update: 11.1.2.3.511 for Oracle Hyperion Financial Reporting 11.1.2.3

    Lia Nowodworska - Oracle-Oracle
    1 Apr 2015 | 3:32 am
    The following Patch Set Update (PSU) has been released for Oracle Hyperion Financial Reporting 11.1.2.3 . This PSU download is available from the My Oracle Support | Patches & Updates section. Oracle Hyperion Financial Reporting 11.1.2.3 PSU 11.1.2.3.511 Patch 20729638 You can apply this patch to the following releases: • 11.1.2.3.500 • 11.1.2.3.500 PSE 18467894 • 11.1.2.3.500 PSE 18609854 • 11.1.2.3.501 PSU 18183723 • 11.1.2.3.502 PSU 19033046 • 11.1.2.3.503 PSU 19570230 • 11.1.2.3.505 PSU 19795686 • 11.1.2.3.508 PSU 20230795 NOTE: If your Financial Reporting server is on…
  • European Value Chain Summit 2015 - A Retrospective

    Ulf Koester-Oracle
    1 Apr 2015 | 3:00 am
    On March 10th and 11th2015, we have completed the 3rd annual Oracle European Value Chain Summit with great success! Over 520 attendees, coming from 20 different countries, found their way to the Twickenham Stadium in London, for a great 2-day program with more than 50 excellent presentations provided by Oracle’s executives, external guru’s, partners, Oracle experts and many customers! With this, it was the largest European supply chain event we have ever hosted! All direct and indirect comments we have got from customers, partners and also from our Oracle colleagues are extremely…
  • Big Data: Una respuesta moderna a un problema de ventas moderno

    Aroa Crespo
    1 Apr 2015 | 2:00 am
    El proceso de venta está cambiando, y cambiando el contacto inicial entre el cliente y representante de ventas en el ciclo de compra.  Nos guste o no, lo cierto es que el ciclo de compras está cambiando. Internet ha acabado con todas las industrias y esta interrupción ha cambiado el paisaje de las ventas. Los clientes ahora tienen más información que nunca, tanto sobre sus productos como los de sus competidores.  Una vez que el cliente entra en contacto con la empresa, casi el 60% del proceso de compra está completo. En otros casos es posible que la compra haya sido rechazada…
  • My favorites partner resources

    Adrian Pruna-Oracle
    1 Apr 2015 | 1:34 am
    First of all I would like to introduce my colleagues’ blog: OracleCloud4Developers. Their goal is to help the developers understand how to use the Oracle PaaS & IaaS for their work. You will be able to read here some of the most technical posts on cloud in this blogosphere. For today I would like to make a recap of my 3 favorite partner resources from Oracle. I will start with Hardware Technical Resource Center for OPN Partners, which is a beehive workspace that provides Sales Engineers and Sales Consultants access to critical technical product information for Oracle servers and…
 
  • add this feed to my.Alltop

    MySQL Performance Blog

  • MySQL shell prompt vs MongoDB shell prompt

    Stephane Combaudon
    1 Apr 2015 | 12:00 am
    Recently Todd Farmer shared an interesting story about the mysql command line prompt in MySQL 5.7: how it was changed to provide more context and why the change was finally reverted. This made me think that after using the command line client for MongoDB for awhile, I would love seeing a much more modern mysql shell prompt. Here are a few examples of what a modern command line client can do.Add dynamic information to the promptIf you use replication with MongoDB, you have probably noticed a nice feature of the prompt: it is replication aware. What I mean is that for a standalone instance, the…
  • Percona XtraBackup 2.2.10 for MySQL hot backups is now available (free!)

    Hrvoje Matijakovic
    31 Mar 2015 | 8:34 am
    Percona is glad to announce the release of Percona XtraBackup 2.2.10 on March 31, 2015. Downloads are available from our download site or Percona Software Repositories.Percona XtraBackup enables MySQL backups without blocking user queries, making it ideal for companies with large data sets and mission-critical applications that cannot tolerate long periods of downtime. Offered free as an open source solution, Percona XtraBackup drives down backup costs while providing unique features for MySQL backups.Bugs Fixed:Decrypting backup with the wrong key would make the backup unusable and…
  • Percona XtraDB Cluster 5.5.41-25.11 is now available

    Hrvoje Matijakovic
    30 Mar 2015 | 9:22 am
    Percona is glad to announce the new release of Percona XtraDB Cluster 5.5 on March 30th 2015. Binaries are available from downloads area or from our software repositories.Based on Percona Server 5.5.41-37.0 including all the bug fixes in it, Galera Replicator 2.11, and on Codership wsrep API 25.11, Percona XtraDB Cluster 5.5.41-25.11 is now the current 5.5 General Availability release. All of Percona‘s software is open-source and free, and all the details of the release can be found in the 5.5.41-25.11 milestone at Launchpad.Bugs Fixed:XtraBackup SST wouldn’t stop when MySQL was…
  • ‘Woz on your mind?’ Share your questions for Steve Wozniak during his Percona Live keynote!

    Tom Diederich
    27 Mar 2015 | 2:34 pm
    Here’s your chance to get on stage with Woz! Sort of. Apple co-founder and Silicon Valley icon and philanthropist Steve Wozniak will participate in a moderated Q&A on creativity and innovation April 14 during the Percona Live MySQL Conference and Expo in Santa Clara, California.Woz once said that he never intended to change the world. That was the other Steve, Steve Jobs.“I didn’t want to start this company,” Woz told the Seattle Times of Apple’s beginnings in a 2006 interview. “My goal wasn’t to make a ton of money. It was to build good…
  • FoundationDB is acquired by Apple: My thoughts

    Peter Zaitsev
    27 Mar 2015 | 6:00 am
    TechCrunch reported yesterday that Apple has acquired FoundationDB. And while I didn’t see any mention if this news on the FoundationDB website, they do have an announcement saying: “We have made the decision to evolve our company mission and, as of today, we will no longer offer downloads.” This is an unfortunate development – I have been watching FoundationDB technology for years and was always impressed in terms of its performance and features. I was particularly impressed by their demo at last year’s Percona Live MySQL and Expo. Using their Intel NUC-based…
  • add this feed to my.Alltop

    DaniWeb IT Discussion Community

  • Database

    aakashchopra121
    1 Apr 2015 | 3:54 am
    what is the best DB to host the cloud? Give me some idea?
  • The future!

    Slavi
    1 Apr 2015 | 3:27 am
    Google's new look Microsoft announced that they are making their own Linux OS MSDOS mobile
  • Fetch Data

    vishal_isharani
    1 Apr 2015 | 3:12 am
    How to Fetch Data form Sites Like Flipkart,Amazone,Snapdeal And Compare Prices Of Products Form This Ecommerce Websites..?
  • view the contents of an excel sheet in datagridview

    rola theo
    1 Apr 2015 | 3:06 am
    Hello !! I use vb.net with excel I have a buttom "get the name of the column from worksheet" with a combobox thi is the code of the button: Private Sub Button7_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button7.Click Dim Excols As New Dictionary(Of Integer, String) Form2.xlWorkSheet = CType(Form2.xlWorkBook.Sheets(Form2.ComboBox1.Text), Excel.Worksheet) Form2.xlWorkSheet.Activate() With Form2.xlWorkSheet Dim LastCol As Integer = Form2.xlWorkSheet.Cells(1,…
  • How to display multiple values in jquery

    ramsiva
    1 Apr 2015 | 2:46 am
    I am facing to dispaly multiple values in another text box this is my code $("#firsttearesult").val(diffHour,diffMins); Any body help me to display both
  • add this feed to my.Alltop

    The State of Security

  • O’Reilly’s First Software Architecture Conference

    Mitch Thomas
    31 Mar 2015 | 8:00 pm
    Recently, I attended the O’Reilly’s Software Architecture Conference — these kinds of things are both inspiring and de-spiriting. I am inspired by the speakers, their ideas, bravery and charisma. Being inspired, I cook up my own ideas for which I have no clue how to find time to act upon… sigh. So, it goes. Without adeu, I […]… Read More The post O’Reilly’s First Software Architecture Conference appeared first on The State of Security.
  • Encryption Backdoors are Unsafe and Ill-founded

    Bob Loihl
    31 Mar 2015 | 8:00 pm
    So, it has passed into the obscurity of the 24-hour news cycle, but recently the U.S. President and the UK PM both made public statements advocating for the government to have a way to decrypt our data at any time. Suggestions have ranged from key escrow schemes to backdoors in the encryption software, and presumably […]… Read More The post Encryption Backdoors are Unsafe and Ill-founded appeared first on The State of Security.
  • Global Energy Sector Targeted in Reconnaissance Malware Attacks

    Maritza Santillan
    31 Mar 2015 | 12:57 pm
    A new Trojan-based campaign is targeting energy companies around the world in an effort to gain access to sensitive information. The majority of companies experiencing attacks are distinctly linked to the petroleum, gas and helium industries located in the Middle East – including UAE, Pakistan, Saudi Arabia and Kuwait. However, businesses in the US and […]… Read More The post Global Energy Sector Targeted in Reconnaissance Malware Attacks appeared first on The State of Security.
  • Anonymous Vows to Strike Israel with ‘Electronic Holocaust’

    David Bisson
    31 Mar 2015 | 4:26 am
    AnonGhost, a group that is said to be affiliated with the global hacking group Anonymous, has released a video in which it vows to punish Israel for its “crimes in the Palestinian territories” with an “electronic Holocaust.” The video message, which includes English and Arabic subtitles, displays images from the Gaza conflict, including footage of […]… Read More The post Anonymous Vows to Strike Israel with ‘Electronic Holocaust’ appeared first on The State of Security.
  • Cybercrime Is Now More Profitable Than The Drug Trade

    Irfahn Khimji
    30 Mar 2015 | 9:00 pm
    Tripwire recently hosted a webcast entitled, “PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan: Real World Cyber Attacks and Protecting Credit Card Data.” For our presentation, Brian Honan (CISM, CGEIT, CRISC), an information systems and cybersecurity specialist and a member of the Advisory Group on Internet Security to Europol’s Cyber Crime Centre […]… Read More The post Cybercrime Is Now More Profitable Than The Drug Trade appeared first on The State of Security.
 
  • add this feed to my.Alltop

    Phil Windley's Technometria

  • Silo-Busting MyWord Editor is Now Public

    24 Mar 2015 | 10:31 am
    Summary: The MyWord Editor and nodeStorage system are a perfect example of what I call a personal cloud application architecture. I've written before about Dave Winer's nodeStorage project and his MyWord blogging tool. Yesterday Dave released the MyWord editor for creating blog posts. I can see you yawning. You're thinking "Another blogging tool? Spare me! What's all the excitement?!?" The excitement over a few simple ideas: First, MyWord is a silo-buster. Dave's not launching a company or trying to suck you onto his platform so he can sell ads. Rather, he's happy to have you take his…
  • Sessions I Want to Hold at IIW

    13 Mar 2015 | 9:53 am
    Summary: I'm going to hold a few sessions at IIW. Here's my list so far. And there's a homework assignment for the bureaucracy session. Internet Identity Workshop XX is coming up in a few weeks (register here). IIW is an unconference, so if you're coming, you might want to start thinking about the sessions you want to hold. There's always room for more topics and the topics you bring are what makes IIW interesting. I'm thinking about sessions on the following topics: The Future of Picos and Fuse—there are a lot of Fuse backers who come to IIW, so it's always a good place talk about…
  • IBM's ADEPT Project: Rebooting the Internet of Things

    18 Feb 2015 | 7:57 pm
    Summary: The Internet of Things, only a few years old, needs a reboot. So says Paul Brody of IBM. The IBM Adept project is a proof of concept for an open, decentralized Internet of Things. I recently spent some time learning about IBM's ADEPT project. ADEPT is a proof of concept for a completely decentralized Internet of Things. ADEPT is based on Telehash for peer-to-peer messaging, BitTorrent for decentralized file sharing, and the blockchain (via Ethereum) for smart contracts (this video from Primavera De Filippi on Ethereum is a good discussion of that concept). The ideas and motivations…
  • MyWord!

    13 Feb 2015 | 1:18 pm
    Summary: Dave Winer has been developing applications that support users owning their own data. His latest is a blog page rendering system he calls MyWord.io. I simply love MyWord.io from Dave Winer. This is such a simple, beautiful idea. Like all such, it seems obvious once you've seen it. MyWord.io is JavaScript for rendering a blog page (or any page, for that matter) from a JSON description of the contents in the style that Medium pioneered. To understand it click to the example JSON file of an article on Anti-Vaxxers and then use MyWord.io to render the contents of the JSON file. MyWord.io…
  • Ambient Computing

    9 Feb 2015 | 2:58 pm
    Summary: Ambient computing is coming and it will have a bigger impact on your life than any change in the last 40 years. A real Internet of Things will be immersive and pervasive. Imagine a connected glass at your favorite restaurant. The glass might report what and how much you drank to your doctor (or the police), make a record for the bill or even charge directly for each glass, send usage statistics to its manufacturer, tweet when you toast your guest, tell the waitstaff when it’s empty or spilled, coordinate with the menu to highlight good pairings, or present to your Google…
  • add this feed to my.Alltop

    Free Information Technology Magazines and Downloads from alltop.tradepub.com

  • Risks of ISIS-Cyber-Terrorism

    31 Mar 2015 | 4:20 pm
    The deep web allows anonymous communication. Bitcoin makes it possible to transfer assets around the globe in seconds, also in absolute anonymity. ISIS has a war chest of over USD $2 billion, seeks to attack the west and is attributed the ability to operate very strategically. Jihadists have been known to embrace technology. Gaping vulnerabilities in the technology-reliant western infrastructure make easy targets. Learn more in this special report.Request Free!
  • The 2015 Social Media Marketing Starter Kit

    31 Mar 2015 | 2:50 pm
    “The 2015 Social Media Marketing Starter Kit” includes the “Getting Started with Social Media” eBook plus 3 other resources to help you jump start your social media marketing strategy.Social media provides a new set of tools that businesses can use to connect with their customers and the general public. Social media tools can be used to get new customers, increase sales, and turn existing customers into your most powerful sales team. But social media is about more than just using these new tools. Social media requires a new way of thinking about your business and your customers.This…
  • The Database Hacker's Handbook: Defending Database Servers (a $50 value) FREE for a limited time!

    31 Mar 2015 | 1:50 pm
    Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.In The Database Hacker's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. The bad guys already know all the information in this book. You need to know it too. Identify and plug the new holes in Oracle and Microsoft(r) SQL…
  • The Essentials of Government Technology - Free Kit

    31 Mar 2015 | 11:20 am
    The Essentials of Government Technology, brings together the latest in information, coverage of important developments, and expert commentary to help with your Government Technology related decisions.The following kit contents will help you get the most out of your Government Technology research:Executive Guide: Harnessing the Power of Enterprise Social CollaborationPreparing Your Infrastructure Monitoring Platform for the Volume, Variety, and Velocity of Big Data NetworksAccelerating the Delivery of Microsoft Office 365Request Free!
  • MWD Advisors Report: Business Rules Engine Business Value in Healthcare

    31 Mar 2015 | 12:00 am
    Healthcare industry structures are changing as the roles of public and private sector entities shift and recombine; in markets like the US, new delivery models are being developed in the quest to change financial incentives in the industry from being volume-based to being value-based.Read this white paper to learn how a Business Rules Management system (BRMS) can help automate and manage business rules, giving organizations the potential implement policies and rules faster, lower IT implementation costs; reduce the turnaround time for change requests; reduce the costs of unplanned changes and…
  • add this feed to my.Alltop

    Free IT - Data Management Magazines and Downloads from alltop.tradepub.com

  • The Database Hacker's Handbook: Defending Database Servers (a $50 value) FREE for a limited time!

    31 Mar 2015 | 1:50 pm
    Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.In The Database Hacker's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. The bad guys already know all the information in this book. You need to know it too. Identify and plug the new holes in Oracle and Microsoft(r) SQL…
  • Sparking Agile Business Decisions: Demystifying the Advantages of Business Rules

    31 Mar 2015 | 12:00 am
    In a business world focused on increasing agility and reducing operational costs, business decisions have become just as valuable as our data, our products and our people.How can you ensure the decisions being made are correct given that your business is constantly changing to adapt to market conditions, customer requirements, regulations and evolving business strategy? This eBook shows you how.Request Free!
  • MWD Advisors Report: Business Rules Engine Business Value in Healthcare

    31 Mar 2015 | 12:00 am
    Healthcare industry structures are changing as the roles of public and private sector entities shift and recombine; in markets like the US, new delivery models are being developed in the quest to change financial incentives in the industry from being volume-based to being value-based.Read this white paper to learn how a Business Rules Management system (BRMS) can help automate and manage business rules, giving organizations the potential implement policies and rules faster, lower IT implementation costs; reduce the turnaround time for change requests; reduce the costs of unplanned changes and…
  • Creating a Cutting-Edge Reporting and Analyst Capability for the Banking Market

    31 Mar 2015 | 12:00 am
    DBS is a leading financial services group and a leading consumer bank, serving more than 4 million, with 1 million retail customers. DBS has adopted Progress to provide a reliable, accurate, and flexible credit scoring process to support both its consumer and commercial loan activities. Progress has replaced manual methods, yet provides agility, allowing rules to be adapted as market conditions and data change, while continuing to provide a reliable platform for decision-making.Request Free!
  • Short Guide to Protecting Against Web Application Threats

    30 Mar 2015 | 2:50 pm
    Although there is no single security measure than can prevent all threats, there are some that provide broad—based mitigation to a number of threats. The use of SSL encryption and digital certificate‐based authentication is one of them.In this paper learn how SSL encryption can protect server-to-server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss. Also included is a step-by-step guide to assessing your needs, determining where SSL encryption and digital certificate-based authentication may be helpful, planning for the…
 
  • add this feed to my.Alltop

    Free IT - Software & Development Magazines and Downloads from alltop.tradepub.com

  • Risks of ISIS-Cyber-Terrorism

    31 Mar 2015 | 4:20 pm
    The deep web allows anonymous communication. Bitcoin makes it possible to transfer assets around the globe in seconds, also in absolute anonymity. ISIS has a war chest of over USD $2 billion, seeks to attack the west and is attributed the ability to operate very strategically. Jihadists have been known to embrace technology. Gaping vulnerabilities in the technology-reliant western infrastructure make easy targets. Learn more in this special report.Request Free!
  • Internet as a reliable Enterprise WAN? Absolutely - with SD-WAN

    30 Mar 2015 | 4:50 pm
    One-quarter of the time, the Internet fails to deliver the level of application performance required by enterprises.Traditionally, the Internet has been considered too unreliable to support enterprise-level applications. Companies had no choice but to use expensive MPLS to support real-time business collaboration, voice, and video apps.The VeloCloud Internet Quality Report's findings show that a cloud-delivered SD-WAN gives enterprises the ability to use the cost-effective Internet broadband to deliver the levels of performance and…
  • Short Guide to Protecting Against Web Application Threats

    30 Mar 2015 | 2:50 pm
    Although there is no single security measure than can prevent all threats, there are some that provide broad—based mitigation to a number of threats. The use of SSL encryption and digital certificate‐based authentication is one of them.In this paper learn how SSL encryption can protect server-to-server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss. Also included is a step-by-step guide to assessing your needs, determining where SSL encryption and digital certificate-based authentication may be helpful, planning for the…
  • Tap the Power of the Collaborative Employee

    30 Mar 2015 | 1:50 pm
    Organizations continue to adopt today’s most innovative technologies to ensure business success. The challenge moving forward remains how to make sense of enterprise technologies as an all-encompassing approach to sustainable business.Appian recently conducted an industry-wide survey on business trends, technological adoption and current goals in process excellence.The following white paper examines how a modern enterprise application platform can serve as the ideal solution to business challenges, allowing employees to be more engaged than ever to achieve business growth.Request Free!
  • Software Defined Storage for Dummies

    30 Mar 2015 | 12:00 am
    Download the Software-Defined Storage for Dummies eBook to learn:The emerging technologies that make software-defined storage a game-changer in the datacenterKey facts about converged infrastructure and datacenter virtualizationTen key software-defined storage facts that all IT experts need to knowRequest Free!
  • add this feed to my.Alltop

    Free IT - Storage Magazines and Downloads from alltop.tradepub.com

  • Internet as a reliable Enterprise WAN? Absolutely - with SD-WAN

    30 Mar 2015 | 4:50 pm
    One-quarter of the time, the Internet fails to deliver the level of application performance required by enterprises.Traditionally, the Internet has been considered too unreliable to support enterprise-level applications. Companies had no choice but to use expensive MPLS to support real-time business collaboration, voice, and video apps.The VeloCloud Internet Quality Report's findings show that a cloud-delivered SD-WAN gives enterprises the ability to use the cost-effective Internet broadband to deliver the levels of performance and…
  • Wildcard and SAN: Understanding Multi-Use SSL Certificates

    30 Mar 2015 | 2:50 pm
    Multi-Use SSL Certificates such as Wildcard and SAN certificates are becoming an increasingly common requirement in securing today's IT infrastructure. Find out about how these certificates can provide greater flexibility to simplify certificate management and reduce costs.Request Free!
  • Your Business In the Cloud

    30 Mar 2015 | 1:50 pm
    In today’s fast-paced, quickly changing world, remaining flexible and able to scale your Business Process Management (BPM) application is essential. Implementing cloud services at the BPM level will give your company an ability to expand its systems on-demand, and at a fraction of typical server maintenance costs.This guide, Your Business In The Cloud: What Every Business Manager Needs To Know, explores the financial benefits of moving to the cloud, as well as the security implications, and some related solutions to consider before moving to the cloud entirely. Topics explored…
  • Software Defined Storage for Dummies

    30 Mar 2015 | 12:00 am
    Download the Software-Defined Storage for Dummies eBook to learn:The emerging technologies that make software-defined storage a game-changer in the datacenterKey facts about converged infrastructure and datacenter virtualizationTen key software-defined storage facts that all IT experts need to knowRequest Free!
  • Overcoming Latency for Remote Access Engineering Applications: Building a Business Case

    26 Mar 2015 | 4:20 pm
    There is no free solution for UNIX / Linux that provides high performance remote application access / virtual desktop access over high latency connections.This is particularly true for engineering applications, as latency can negatively impact their operating effectiveness.Discover more about remote access solutions for UNIX and Linux environments that can:  Consolidate your UNIX + Windows endpoints to a single Windows endpoint with X server (UNIX) emulation capabilitiesReduce the number of physical servers in the data centerAllow remote access from mobile devicesIn this white paper you…
  • add this feed to my.Alltop

    Business Technology Roundtable

  • How to Reach Digital Business Goals with IT-as-a-Service

    David H Deans
    9 Mar 2015 | 4:44 pm
    Senior executive expectations have been raised for traditional IT organizations that broker cloud computing services for their internal business stakeholders. Besides, there's a belief that the lack of dimension maturity can slow digital service innovation outcomes.As a result, International Data Corporation (IDC) now predicts that by 2016, 65 percent of global competitive strategies will require real-time IT-as-a-Service (ITaaS) solutions.The ability of CIOs and their  IT organizations to grasp how business wants cloud computing services that serve actual business needs -- not…
  • The DevOps Path to Digital Transformation Nirvana

    David H Deans
    9 Feb 2015 | 1:53 pm
    Back in 1982, many pundits in the business media were raving about the publication of "In Search of Excellence" – a book written by Tom Peters and Robert Waterman. As you may recall, the topic wasn't about the typical mainstream company of that time. Instead, it was about forty-three selected companies that were deemed to be “excellent” by the two authors.Those companies were chosen to be profiled due to their superior organization and people processes. Today, it’s more likely for management consultants to write about business technology adoption – specifically, digital…
  • Where Mobile Cloud is Driving the Greatest Value

    David H Deans
    29 Dec 2014 | 12:53 pm
    How agile is your IT organization? Have you kept pace with the rapid evolution of cloud computing services? Have you applied that cloud investment to connect with your key stakeholders in the marketplace? Are you ready to seize the opportunities from the emerging mobile cloud trend?If you answered NO to any of these questions, you're at a competitive disadvantage with your more digital savvy business technology peer group. The leading organizations worldwide will rely on cloud infrastructure to achieve commercial benefits that extend far beyond IT cost reduction goals.Informed CEOs and other…
  • Cloud Adoption Trend is Driven by Strategic Imperatives

    David H Deans
    15 Dec 2014 | 5:00 am
    As this year comes to a close, let's take one last look at the most pervasive cloud computing trends -- including increased usage across the different cloud service models, the key business drivers and the impact of agile innovation strategies.Cloud computing adoption has matured, with 69 percent of survey respondents stating that at least a portion of their computing infrastructure is in the cloud. However, 56 percent of companies are still identifying IT operations that could potentially move to the cloud, according to the latest market study by IDG Enterprise.Survey respondents believe…
  • The Emerging Business Technology Outlook for 2015

    David H Deans
    26 Nov 2014 | 12:07 pm
    The savvy CEOs that approved significant investments in business technology during 2014 are reaping the rewards of their first-to-market leadership advantage. Meanwhile, executives at the fast-follower companies are no doubt assessing how they plan to catch-up with the early-adopters of cloud services in 2015.This rapidly evolving IT transformation scenario is pervasive. It's happening in every corner of the globe. So, what's the outlook for worldwide cloud service adoption and how will the key trends impact cloud computing infrastructure investment? To get the answers to those questions,…
 
  • add this feed to my.Alltop

    Modis

  • Highest Paying Security Jobs and Certifications

    Mimi Wachholz
    30 Mar 2015 | 12:52 pm
    As companies strive to protect themselves from data breaches, the demand for exceptional security talent is increasing. According to the U.S. Bureau of Labor Statistics, the projected job growth for information security analysts of all kinds through 2022 is 37 percent – much faster than average. Additionally, Computerworld’s 2015 Forecast survey found that 28 percent of […] Highest Paying Security Jobs and Certifications is a post from: Modis The post Highest Paying Security Jobs and Certifications appeared first on Modis.
  • Regional Jobs Report Shows Positive Growth In IT Sector

    Mimi Wachholz
    27 Mar 2015 | 11:35 am
    The Bureau of Labor Statistics just released the regional unemployment report for February and while month-over-month rates were little changed, year-over-year unemployment saw significant decreases. In fact, 46 states saw drops in unemployment from the year prior. Similar to January, half of our states had lower unemployment rates in February compared to the month prior. This month, we […] Regional Jobs Report Shows Positive Growth In IT Sector is a post from: Modis The post Regional Jobs Report Shows Positive Growth In IT Sector appeared first on Modis.
  • Why IT Recruiters Have More Fun

    Modis
    23 Mar 2015 | 11:47 am
    IT, as a job function, is undergoing a big paradigm. Once perceived as a ‘cost-sink,’ IT has now become a revenue engine — responsible for today’s most pressing questions related to big data, scalability, and the cloud. IT teams are navigating new business questions related to big data and infrastructure for the first time. It’s […] Why IT Recruiters Have More Fun is a post from: Modis The post Why IT Recruiters Have More Fun appeared first on Modis.
  • Significant Year-Over-Year Growth Highlighted in January Regional Jobs Report

    Mimi Wachholz
    17 Mar 2015 | 11:20 am
    The latest regional report from the Bureau of Labor Statistics shows about half of our states with lower unemployment rates compared to December’s numbers. In January, we saw 24 states with an unemployment rate decrease, 8 states and the District of Columbia with no change. While month-over-month regional and state unemployment rates were little changed, […] Significant Year-Over-Year Growth Highlighted in January Regional Jobs Report is a post from: Modis The post Significant Year-Over-Year Growth Highlighted in January Regional Jobs Report appeared first on Modis.
  • Green with Envy: Superheroes and Villains we Wish we Could be on St. Patrick’s Day

    Modis
    13 Mar 2015 | 6:41 am
    Saint Patrick’s Day is almost upon us, which once again means it’s time to prepare for the festive traditions of donning green garb, imbibing green beverages and enjoying green edibles of all sorts. But for those of us who spend our days steeped in the tech world and — let’s be honest — generally prefer to walk […] Green with Envy: Superheroes and Villains we Wish we Could be on St. Patrick’s Day is a post from: Modis The post Green with Envy: Superheroes and Villains we Wish we Could be on St. Patrick’s Day appeared first on Modis.
  • add this feed to my.Alltop

    Converge Blog

  • Converge Ensures Hi-Reliability with AS6081

    Converge
    12 Mar 2015 | 7:34 am
    Nobody ever expects to receive a counterfeit part, but inevitably in the electronics components distribution supply chain, it can happen. And in hi-reliability industries like the medical, military, defense, and aerospace fields, where the ruggedness, reliability, and durability of these components are so critical, counterfeit parts can sometimes prove fatal. Electronic components typically utilized in this space must be able to withstand and perform in harsh conditions such as extreme temperatures, shock, vibration, moisture, dust, and dirt. So there is no room for errors or failures. So in…
  • Home for the Holidays with Arrow

    Converge
    23 Dec 2014 | 8:24 am
    For many, the holidays evoke a special warmth, especially when families make that extra effort to come together to share experiences, remember their family ties and strengthen that bond.For us at Converge, this year finds us closer to our Arrow family, with Arrow colleagues now sharing our Peabody facility and holiday spirit. A huge part of what makes us a “happy family” is our shared commitment to quality and our customers.Our quality practices, certifications and affiliations work together to ensure our customers have the availability of quality products and services on which they rely.
  • What's Q360 Quality? And Why Now?

    Converge
    20 Nov 2014 | 9:05 am
    In previous blogs, we have discussed concerns about substandard components in the supply chain, but when the President of the United States signed the National Defense Authorization Act (NDAA), all suppliers took notice.Signed in 2013, the NDAA addresses many global and national defense issues as well as counterfeit components in the supply chain. In the NDAA, there is reference to revising and enforcing current protocols and developing stronger regulations requiring component suppliers to implement safeguards and demonstrate a system to help detect and avoid having suspected counterfeit…
  • Electronica is Celebrating 50 Years!

    Converge
    17 Sep 2014 | 9:08 am
    Congratulations to electronica on this golden anniversary – 50 years of success and still going! So don’t miss it -- register for electronica 2014 now and start packing your bags!Converge is so excited and honored to be a part of history and electronica 2014 that we have been making preparations for this global electronics trade fair for over a year. electronica 2014, which takes place in Münich, Germany, November 11-14, is considered one of the world’s most important trade shows for the electronics industry. It essentially covers just about everything from components and systems to…
  • Customer Service in Operations? Converge in APAC

    Converge
    12 Aug 2014 | 8:54 am
    Great customer service can come from many different areas of a business. For a company to stay ahead of the competition and keep customers coming back, it becomes critical to deliver on a customer’s expectation the very first time. This can be a challenge for an independent distributor, especially when there could be increased demand due to new technology, supplier/production shutdowns, or seasonal demands. Supplier lead times, numbers of orders, and special customer requests can have a substantial impact on meeting delivery expectations and overall customer service.Yes, it is true that…
  • add this feed to my.Alltop

    RES Software Blog

  • RES Software Nederland named a Great Place to Work 2015

    Bob Janssen, Founder and CTO
    25 Mar 2015 | 4:00 am
    We are pleased to announce that RES Software Nederland was named a Best Place to Work 2015 by Great Place to Work® Netherlands. A recognition earned directly from the feedback of RES Software employees. Every year, the highest scoring organizations are distinguished as Best Workplaces in the Netherlands. Great Place to Work® Netherlands investigates the […] The post RES Software Nederland named a Great Place to Work 2015 appeared first on RES Software Blog.
  • Healthcare Consolidation: Ensuring Compliance and Streamlining IT Security

    Ellen Derrico, Senior Director of Product Marketing
    20 Mar 2015 | 2:20 am
    For healthcare providers, regulatory compliance for system and data access goes hand-in-hand with IT security. As we gear up for the HiMSS conference in April here at RES Software, I’m thinking a lot about these issues and how they fit in with this year’s HiMSS theme of Staying Ahead of the Curve. One thing that […] The post Healthcare Consolidation: Ensuring Compliance and Streamlining IT Security appeared first on RES Software Blog.
  • Truth #1 – Security Isn’t Just About Things. It’s About People

    Stacy Leidwinger, V.P. of Product Marketing
    18 Mar 2015 | 1:34 am
    It shouldn’t come as a shock that in a recent CIO.com study on What Keeps CIOS Awake at Night, security planning is listed as the lowest priority for budget cuts in 2015. Here’s why: it seems that every time I turn on the global news, I am hearing about yet another security breach or cyber-attack. […] The post Truth #1 – Security Isn’t Just About Things. It’s About People appeared first on RES Software Blog.
  • Can You Balance Security and Employee Productivity?

    Diana Wong
    16 Mar 2015 | 3:16 am
    It’s all over the news…the rise of corporate security incidents.  Besides the commonly recognized data security breaches like hacks (I unfortunately discovered that I was one of the millions of Anthem insurance breach victims when I recently received a letter about free credit monitoring), there are many other culprits in this security mess. Negligent and […] The post Can You Balance Security and Employee Productivity? appeared first on RES Software Blog.
  • The RES Success Center – Your Online Enablement Resource

    Michael Dieterle, Director of Knowledge and Enablement - Professional Services
    11 Mar 2015 | 5:30 am
    Today we have launched the RES Success Center, our new state-of-the-art online resource designed to enable our customers and partners to be more successful in using our products. Your success means we at RES Software are honoring our promise of delivering outstanding products and exceptional services. Together with our global network of partners, we consider […] The post The RES Success Center – Your Online Enablement Resource appeared first on RES Software Blog.
 
  • add this feed to my.Alltop

    The Data Center Journal

  • If you are focused only on cost you might miss other cloud storage benefits

    Greg Schulz
    1 Apr 2015 | 5:42 am
    Drew Robb (@robbdrew) has a good piece (e.g. article) over at InfoStor titled Eight Ways to Avoid Cloud Storage Pricing Surprises that you can read here. Drew start’s his piece out with this nice analogy or story: Let’s begin with a cautionary tale about pricing: a friend hired a moving company as they quoted a very attractive price for a complex move. They lured her in with a low-ball price then added more and more “extras” to the point where their price ended up higher than many of the other bids she passed up. And to make matters worse, they are already two weeks late with…
  • Dimension Data Launches Data Center Maturity Tool to Help Companies Migrate to the Next-Generation Data Center

    Press Release
    31 Mar 2015 | 2:41 pm
    Dimension Data, the $6.7 billion global ICT solutions and services provider, today launched a new maturity tool that helps organizations assess their capabilities and prioritize initiatives for building a next-generation data center. The Data Center Development Model—the first assessment that covers such a broad spectrum of the data center—was created off the back of strong demand from clients seeking guidance and actionable plans to make their data centers more responsive and agile. According to Steve Joubert, group executive for data centers at Dimension Data, global competitive…
  • How Should the Technology World Address Discrimination?

    Jeff Clark
    31 Mar 2015 | 9:38 am
    The recently passed legislation in Indiana has raised the ire of some executives (such as Apple CEO Tim Cook) and others in the technology world who view it as a license for discrimination. But there’s a way to balance equal protection under the law, individual freedom and different moral sentiments—non-violently and “democratically.” Doing so, however, requires both a live-and-let-live attitude as well as the courage to shed political correctness. Here’s how we can make an imperfect world a little better. The Non-Aggression Principle Most people would likely agree that our business…
  • Graphene Products on the Way?

    Jeff Clark
    31 Mar 2015 | 6:45 am
    One of the main challenges surrounding research on graphene (and its close cousin, carbon nanotubes) has been how to convert this so-called wonder material into marketable products. Despite its high strength, high conductivity and other unique properties, attempts to apply it in the real world have yielded few results so far. But some progress may be underway, with graphene expected to appear in consumer light bulbs this year, according to Lucas Mearian at Computerworld. “The bulb contains an LED light that’s shaped like a [sic] incandescent bulb’s filament, but that’s coated in…
  • Cloud Conversations: AWS S3 Cross Region Replication storage enhancements

    Greg Schulz
    31 Mar 2015 | 6:05 am
    Amazon Web Services (AWS) recently among other enhancements announced new Simple Storage Service (S3) cross-region replication of objects from a bucket (e.g. container) in one region to a bucket in another region. AWS also recently enhanced Elastic Block Storage (EBS) increasing maximum performance and size of Provisioned IOPS (SSD) and General Purpose (SSD) volumes. EBS enhancements included ability to store up to 16 TBytes of data in a single volume and do 20,000 input/output operations per second (IOPS). Read more about EBS and other recent AWS server, storage I/O and application…
 
  • add this feed to my.Alltop

    Paragon Software Blog

  • With Camptune X the whole resize operation is literally as easy as moving a slider!

    Ksenia Schevjeva
    12 Mar 2015 | 12:01 pm
    Paragon Camptune X Now Resizes Boot Camp Partitions Even on Fusion Drives or FileVault Encrypted Volumes A new Paragon Camptune X comes with Core Storage technology support, a new and more intuitive and reliable interface based on Mac OS X elements, and the ability to identify and automatically fix an unsynchronized partition layout or any file system [...]
  • New Partition Manager 15 performs all kinds of partitioning tasks

    Ksenia Schevjeva
    11 Mar 2015 | 6:55 am
    Wizards keep the job simple, Paragon’s technology keeps data safe Make full use of your hard disk capacity! The Partition Manager offers an extensive range of functions for flexible partitioning, optimization and managing your computer. No matter whether you are restructuring your hard drive and dividing it up in partitions, redistributing free memory storage space, using [...]
  • Paragon releases the first solution to back up Windows under OS X! And it’s free!

    Ksenia Schevjeva
    5 Mar 2015 | 12:32 pm
    Allows sector-level backup, incremental imaging, selective restore Paragon Boot Camp Backup is the industry’s first and free OS X based backup solution for Windows partitions on Mac computers. The backup tools that are delivered with Apple’s operating system do not support the Windows native file system NTFS and work on the file level only which has [...]
  • Paragon Disk Wiper 15 for Mac OS X Free and other tools on MacToolbox portal

    Ksenia Schevjeva
    17 Feb 2015 | 6:38 am
    Paragon Mac ToolBox portal offers an array of Mac tools to solve anything from operating systems incompatibility issues to redistribution of free space between Mac and Windows partition We are excited to announce Paragon Disk Wiper 15 for Mac OS X Free – a utility to efficiently clean hard disks and SSDs or permanently erase critical data [...]
  • Paragon Software shares its expertise in wiping SSDs

    Ksenia Schevjeva
    23 Dec 2014 | 4:25 am
    Everything you should know about  disk sanitization techniques for HDDs and SSDs! According to the US Department of Commerce data security breaches cost over $250 billion to US companies per year. This means providing confidentiality implies not only information to be stored properly, but also be destroyed according to certain rules. The article Why_Wipe_SSD is going [...]
  • add this feed to my.Alltop

    Enterprise Network Security Blog from ISDecisions

  • How to reduce the risk of Insider Threat in Healthcare

    François Amigorena
    31 Mar 2015 | 3:02 am
    Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be the biggest divas in Hollywood, along with some embarrassing email chains involving comments from senior executives. Which is interesting, and / or scandalous, depending on your perspective, but mostly information we could be flippant about. What we could be less flippant about was the thousands of employee social security numbers that were laid bare. These were innocent…
  • An Insider Threat Program to help tackle Internal Security Breaches

    Chris Bunn
    19 Mar 2015 | 4:44 am
    According to new research from IS Decisions, 2015 is set to see a huge rise in the number of IT Professionals taking action to address insider threat in their organization. Another day, another massive security breach of millions of consumer or company records. As the stories behind many of these breaches unravel, frequently the source appears to be an internal one. J P Morgan, Sony Entertainment, eBay, Anthem and the latest, Premera – all of these headline dominating hacks from 2014 and now 2015 point to either malicious or careless user behavior. However, the continual high profile…
  • IS Decisions y MacroSeguridad se presentarán en Segurinfo Argentina 2015

    Chris Bunn
    4 Mar 2015 | 2:12 am
    IS Decisions, junto con el distribuidor MacroSeguridad, se presentarán en Segurinfo Argentina 2015, Congreso y Feria Iberoamericana de Seguridad de la Información que se llevará a cabo en Buenos Aires el 10 de marzo de 2015. IS Decisions together with our partner MacroSeguridad will be represented at the upcoming Segurinfo Argentina 2015. This leading Information Security event is being held in Buenois Aires on March 10th. En la edición 2015 el evento estará enfocado en BCM (Business Continuity Management) y al IT Derecho. Segurinfo es el congreso más importante que se realiza en la…
  • File Monitoring Software Update. Much more than a file access log.

    Chris Bunn
    17 Feb 2015 | 2:45 am
    We are pleased to announce the release of an update to our file monitoring software solution – FileAudit. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems in real time. IT professionals can set up real-time alerts to predetermined events, such as file deletions, denied access or suspicious user activity, which automatically trigger an email to selected recipients. The alerts enable IT managers to see what’s happening with the organization’s data and quickly identify…
  • The wealth of Personal Information accessed in Anthem Network Breach

    Chris Bunn
    9 Feb 2015 | 2:27 am
    Anthem, the second largest health insurer in the United States, are the latest high profile victim of a major data security breach. Compromised network credentials for up to 5 employees are thought to have been used to gain unauthorized network access to a corporate database, reportedly containing a wealth of personal information on current and former U.S. customers and employees. Sensitive Personal Information maintained in a Network In a released statement Anthem report that as many as 80 million customers have had their personal information stolenEmployees were also exposed, including the…
  • add this feed to my.Alltop

    MarkjOwen's Blog

  • BOK wisdom

    markjowen
    20 Mar 2015 | 3:41 am
    After my last post, a lengthy discussion started in LinkedIn regarding what the BABOK is. One commenter – Magnus Stensson – posted a superb comment… I think there are, roughly speaking, three different groups of interpreters when it comes to … Continue reading →
  • BABOK is all well and good – but in the “real world”…?

    markjowen
    17 Mar 2015 | 8:25 pm
    This post has been updated to include further detail on the way the BABOK presents information. One of the main comments I heard today, at an Accelerated CBAP course, was “this is all fine, but in the real world things … Continue reading →
  • The Pro’s and Con’s of using a Livescribe smartpen – for Business Analysis

    markjowen
    4 Mar 2015 | 8:03 pm
    In 2013 I purchased a Livescribe pen. For those that aren’t in the know, a Livescribe pen allows you to capture the conversation taking place while you are writing notes. By using specially marked paper, the pen can synchronise the audio … Continue reading →
  • What I like in an Agile article, post, or book…

    markjowen
    1 Mar 2015 | 1:39 am
    …is balance. There are so many Agile books, articles, and posts that do one of two things: spend a lot of time pointing out how evil, backwards, or just plain stupid anything, that isn’t Agile, is. Spend a lot of time … Continue reading →
  • Age of the App

    markjowen
    8 Feb 2015 | 1:58 pm
    Originally posted on Brian's Blog:Rogers and Moore’s customer adoption curves illustrate the results of several factors in apparent opposition; Value and Risk.  This two primary factors have been used to explain customer purchasing behavior as well as clustering…
 
  • add this feed to my.Alltop

    Speaking our Mind

  • A Glimpse Into the Inner Workings of an Agile Team

    Danielle McDuffie
    24 Mar 2015 | 4:35 am
    “We call her ‘The Muscle’ because she gets stuff done,” said Caleb Eades about Swati Shenoy, his manager at the Gainesville Delivery Center. “She’s awesome!” Swati Shenoy inherited a stalled project. Requirements had been gathered, user stories had been written. The BA for the project, Adriene Shepherd, had spent two months onsite with the client […]
  • Create and configure products faster on SAP Insurance

    Deepak Mohan
    23 Mar 2015 | 4:02 am
    Several Insurance companies are accelerating business growth by migrating from legacy disparate systems to the SAP Insurance platform. The challenge, however, is to be able to migrate quickly so that they can release existing and new products faster to keep pace with rapidly-changing market opportunities. Believe it or not, that’s easier said than done. First, […]
  • May the fastest to market win: Three reasons to go agile in your digital transformation

    Peeyush Dubey
    16 Mar 2015 | 3:33 am
    Hear that sound? It’s the sound of innovation whizzing by. And don’t blink! Or you’ll miss the next one. And the next. Everyone is clamoring to woo and win customers with the sleekest, shiniest digital experience before the competition catches up. Why? Because customers no longer just wish for intuitive interfaces, personalized treatment, and real-time […]
  • Mindtree Wearables Blog – Travel and Transportation

    Umesh Neelakantan
    12 Mar 2015 | 6:45 am
    Travel Wearables will Augment the skills of Human Workers The imagined applications for wearable technology in the travel and transportation segment are practically boundless. We are already seeing a lot of innovation around wearables in the airline industry. For instance, wearables are being used to assist staff with passenger-related information, to help passengers with searching […]
  • Mindtree Wearables Blog – Banking & Insurance

    Umesh Neelakantan
    5 Mar 2015 | 2:42 am
    Wearable Banking & Insurance: How Devices are Moving into the Branch Unlike previous technology revolutions centered around a uniform device type (like the smartphone or the tablet) the wearable device revolution portends the development of a long list of disparate product types. These include smart glasses and smart shirts that bear only a superficial resemblance […]
  • add this feed to my.Alltop

    The Accidental Successful CIO

  • Have A Very Happy Easter!

    drjim
    1 Apr 2015 | 2:00 am
    If It's Easter, Then Spring Must Be Here!   Finally! Easter has finally arrived. I hope that you are going to be able to take some time off and celebrate this special season as Spring is just around the corner and Winter is quickly becoming a distant memory! I’m going to take this week off and get some well deserved rest. However, I’ll be back next week with some great new CIO tips and techniques for you. Enjoy this week and we’ll talk again next week… – Dr. Jim Anderson
  • BYOD: Is This A Good Thing Or A Bad Thing For CIOs?

    drjim
    25 Mar 2015 | 2:00 am
    Sure BYOD seems like a good idea, but is there a down side?Image Credit: Jeramey Jannene Who’s responsibility is it to make sure that a company’s employees have proper communication tools? In the past, the answer to this question was simple – these tools were complicated and expensive and because of the importance of information technology it was the company’s job to properly equip their employees so that they could stay in touch. Well, things have changed. Now it’s the company’s employees who are showing up with the latest cell phones and tablets and they want…
  • CIOs Need Learn How To Defend Against The Bad Guys

    drjim
    18 Mar 2015 | 2:00 am
    CIOs have to learn how to defend against the bad guysImage Credit: Alyse & Remi The person with the CIO job needs to understand that his or her company is under constant attack. Yes, some of the attacks come from hostile hackers who are always probing your company’s IT defenses trying to find a way in; however, we must not forget the impact that severe weather can have on the operations of both our IT departments and our company. Clearly, CIOs need to learn how to defend their departments and their companies against all the bad guys… Why Bother? I’m going to be the first…
  • CIOs Need To Always Be Experimenting

    drjim
    11 Mar 2015 | 2:00 am
    The way that you become a better CIO is by experimentingImage Credit: Steve Jurvetson How good of a CIO are you? I’m willing to bet that no matter how good you think that you are, you also realize that you could probably be better. We all believe this. However, now we run into the big question: how can a CIO become better? It turns out that the answer is actually fairly simple to understand even if it’s hard to do: you’ve got to do some experimenting. What Experiments Can Reveal To A CIO One of the biggest challenges that I see new people with the CIO job trying to deal with…
  • How To Make Your Business Process Management (BPM) Mobile Friendly

    drjim
    4 Mar 2015 | 1:00 am
    In this mobile age, your business processes need to be mobile friendlyImage Credit: Milica Sekulic So just exactly what is a business process? In a nutshell, it’s how your company does business. Now this might sound rather simple to you, but it turns out that most of the business processes that our firms use to do business are complicated multi-step beasts and are increasingly dependent on the importance of information technology.. The arrival of everyday mobile devices has had a major impact on how firms perform their business processes. As the person with the CIO job, it’s going…
  • add this feed to my.Alltop

    Informatica Perspectives

  • Perceived Value Framework for Data Centric Solutions

    Shane Pearson
    31 Mar 2015 | 11:45 am
    A lot of my time is spent discussing enterprise and end user value of software solutions. Increasingly over the last few years the solution focus has moved from being first about specific application and business processes to being data centric. … Continue reading » The post Perceived Value Framework for Data Centric Solutions appeared first on Informatica Perspectives.
  • Becoming Analytics-Driven Requires a Cultural Shift, But It’s Doable

    Joe McKendrick
    31 Mar 2015 | 8:45 am
    For those hoping to push through a hard-hitting analytics effort that will serve as a beacon of light within an otherwise calcified organization, there’s probably a lot of work cut out for you. Evolving into an organization that fully grasps … Continue reading » The post Becoming Analytics-Driven Requires a Cultural Shift, But It’s Doable appeared first on Informatica Perspectives.
  • 5 Reasons to Attend Informatica World 2015

    George Paolini
    31 Mar 2015 | 5:45 am
    We will be descending on the Cosmopolitan Hotel in Las Vegas May 11-15 to partake in Informatica World 2015. Will you be there? If you are still undecided, here’s five reasons to go. One Conference, All Things Data If it … Continue reading » The post 5 Reasons to Attend Informatica World 2015 appeared first on Informatica Perspectives.
  • What are Incorrect Addresses Costing your Company?

    Jennifer Wayland
    30 Mar 2015 | 5:45 am
    I live in a small town in Maine. Between my town and the surrounding three towns, there are seven Main Streets and three Annis Roads or Lanes (and don’t get me started on the number of Moose Trails). If your … Continue reading » The post What are Incorrect Addresses Costing your Company? appeared first on Informatica Perspectives.
  • Master Data Management in Oil and Gas Industry

    Prash Chandramohan
    27 Mar 2015 | 8:45 am
    The Oil and Gas (O&G) industry is an important backbone of every economy. It is also an industry that has weathered the storm of constantly changing economic trends, regulations and technological innovations. O&G companies by nature have complex and intensive … Continue reading » The post Master Data Management in Oil and Gas Industry appeared first on Informatica Perspectives.
 
  • add this feed to my.Alltop

    IT Manager Daily

  • Most mobile users engage in risky behavior

    David King
    31 Mar 2015 | 11:49 am
    Even those who think they’re privacy and security conscious when it comes to mobile devices might be sorely mistaken.  Many users are committing some basic and pretty dangerous security sins according to a Lookout survey of mobile users. The wide-ranging survey touches on many different topics, but most will be familiar to IT. Users feel data’s at risk The best news to come out of the survey is that most users do feel concerned about protecting mobile data and their privacy. The problem is, their behaviors sometimes don’t reflect those concerns. For instance, while 76% of…
  • Could your next outage be your last?

    David King
    31 Mar 2015 | 7:38 am
    Companies are paying lip service to their disaster recovery plans, but according to a recent survey, they aren’t actually putting in the legwork to make sure outages are planned for.  A recent NTT Communications survey found: 90% of executives saw disaster recovery (DR) as important, but 50% didn’t have a documented DR plan, and 23% of those who did have plans had never conducted testing of them. IT’s knowledge on the subject of DR also was lacking in this survey. While 55% of businesses said they were required to comply with DR regulations, 20% of IT managers were unsure…
  • 3 keys to actually getting those cloud savings you were promised

    David King
    25 Mar 2015 | 11:23 am
    You’ve heard over and over that the cloud offers great opportunities for cost savings – and may have reaped some of the benefits already. Here’s a step-by-step guide for making sure you’re the hero who is able to harness these benefits and show their worth to decision makers.  All too often IT is involved in cloud decisions relatively late. Rather than being active advocates for cloud services, they’re the ones called in at the last minute to implement the solutions … if that call ever comes at all. Forrester Research has updated and revamped its guide to…
  • 4 Steps to Successful IT Systems Management

    gdimaio
    25 Mar 2015 | 8:30 am
    Organizations both large and small, public and private, U.S.-based and international are facing unprecedented challenges in an effort to support critical business initiatives in today’s dynamic business environment. Users are now distributed, mobile and technology savvy. They bring their own mobile devices to the workplace and expect quick and efficient IT services and support for those systems. It’s the Wild, Wild West out there and IT teams are expected to bring law and order to the table in order to protect and secure the organization while supporting the changing needs of each…
  • Exploring Windows 8 For Dummies: $9.99 eBook, FREE for a limited time!

    gdimaio
    25 Mar 2015 | 8:00 am
    Exploring Windows 8 For Dummies packs 168 pages of magazine-style articles, lavish illustrations, and great tips into an eye-catching publication that shows you how to use the new Windows 8 operating system from start to finish. Explore new features, like the touchscreen-style interface, a big change from the classic Windows look and feel. Click here to learn more!   The post Exploring Windows 8 For Dummies: $9.99 eBook, FREE for a limited time! appeared first on IT Manager Daily.
  • add this feed to my.Alltop

    mrc's Cup of Joe Blog

  • What’s the true cost of your legacy applications?

    Joe Stangarone
    31 Mar 2015 | 8:00 am
    Summary: Many businesses still run on legacy applications. Is your business one of them? If so, how much are these legacy applications costing your company? It might be more than you think. Here are 7 ways legacy applications can hurt the bottom line. photo credit: jurvetson via photopin cc Many businesses across the globe still run their operations on legacy systems and applications. Some still run on software created 20-30 years ago. Why don’t they replace these legacy applications? It usually boils down to one of two reasons. 1. They’re locked down. These legacy systems run the…
  • Free Webinar: Bring your pivot tables to the web

    Joe Stangarone
    30 Mar 2015 | 12:55 pm
    Summary: Commonly found in spreadsheet programs (like Excel), pivot tables are interactive tables that automatically extract, organize, and summarize data. However, while pivot table reporting is almost synonymous with Excel, is it really the right tool for the job? Pivot tables are a staple of modern business reporting. Typically found in spreadsheet programs (like Excel), they let users quickly examine nearly any aspect of their data, make comparisons, and discover trends. But, are spreadsheets really the right tool for the job? No. You see, many businesses don’t understand the risks…
  • Is your business data really secure? (Part 1)

    Joe Stangarone
    24 Mar 2015 | 8:00 am
    Summary: With data breaches on the rise, security becomes more important than ever. Is your company (unwittingly) putting your data at risk? Are you following best practices for data security? Learn 7 ways to better secure your data. They say that “any press is good press.” But, I’d guess that any of those companies who suffered widely publicized data breaches recently would argue with that. Does it feel like data breaches are becoming more frequent? It’s true. A recent IBM report finds a 12% year-to-year increase in security incidents. What’s worse: These breaches lead to…
  • Free Webinar: How to automate manual business processes in one day

    Joe Stangarone
    23 Mar 2015 | 12:50 pm
    Summary: Do you (or your employees) waste time on manual business processes? What if you could automate those manual processes in just a few hours? Just imagine how much more productive you (or your employees) would be! To learn how to quickly automate your manual processes, join us for this webinar. As technology evolves, the need for business flexibility increases. According to Forrester, “Only the agile business can remain competitive in this environment.” The modern business must move quickly, and adapt to changing trends. The problem: Manual business processes still slow down many…
  • Weekly Recap: Future mobile trends, a Hadoop primer, and more…

    Joe Stangarone
    20 Mar 2015 | 12:36 pm
    Summary: In this week’s article roundup, we learn about the most common security flaw in businesses, a few ways mobile will change the world in the next few years, and more. Don’t overlook your biggest security flaw — your talent What’s your best line of defense against cybersecurity threats? Skilled, experienced, highly trained IT talent. But, what happens when you can’t afford to bring in the talent you need? What happens if you can’t find the right talent? How do you bridge the skills gap? 5 trends that will change the mobile world in the next 5 years Mobile is…
 
  • add this feed to my.Alltop

    Information Space

  • NEXIS: Student Lab of Innovators Supporting Innovators

    Braden Croy
    31 Mar 2015 | 9:20 am
    Demonstrators Ben Marggraf and Tom Buchanan at a NEXIS-X event It’s a good day at the iSchool when you walk through the ICE Box and see a few dozen excited students learning advanced technology skills from their peers. But then again, making that sort of scene a regular occurrence on campus is the goal of NEXIS-X, a community outreach and peer-to-peer workshop program hosted by NEXIS, a student-based research lab housed at the iSchool. Conceived during an early ideation session last semester, NEXIS-X events have become a hallmark of NEXIS’s community outreach program. Over the course of…
  • LIS Brief: Liblishers (libraries as publishers) – A Chat with Kathryn Deiss of ACRL

    Carl C. Haynes
    30 Mar 2015 | 7:27 am
    Do you remember when you had that paper to write? You barely narrowed down your topic. You kept researching, keeping up with the news, and chatting with classmates. Your professor took some time and listened to you gibber a little, but he knew you would figure it out (or at least you did). Then he introduced you to an expert who said something that made all the light bulbs go off! Kathryn Deiss (photo by Kyle Cassidy) Recently, I had a conference call with Kathryn Deiss, Content Strategist at ACRL, about the topic of libraries as publishers. ACRL has just published “Getting the Word…
  • The Streaming App ‘Periscope’ – and How It’s Changing Live News

    Natalie Wiesnet
    27 Mar 2015 | 7:29 am
    Video streaming apps have skyrocketed in popularity with the introduction of Meerkat and its widespread adoption by celebrities, especially. But the new streaming app that everyone is talking about, especially after a recent New York City building collapse, is called Periscope. Periscope is an app that is relatively easy to sign up for–you just need to download the iOS friendly app to your phone, log in with your Twitter account, and then you’re all set to watch. You can also follow your Twitter friends as well as celebrities or people whose streams you like. The giant pull with…
  • Startup Roundup: Cuselight – A College Resource Network

    Hikari Matsuo
    26 Mar 2015 | 6:55 am
    Student Startup Madness Student Startup Madness (SSM), a national tournament-style competition for college student digital media startups, began its 2015 competition by announcing that 64 startup teams from across the nation made it to the first round of the competition. Six teams from Syracuse University were among them. Then, according to the SSM official website, eight more teams were chosen to pitch at SXSW’s Interactive Events competition for the title of SSM National Champion. The national champion was chosen this week, and the results can be found here. Last year, however,…
  • Two MLIS Grads Selected as ALA Emerging Leaders

    Anjali Parasnis-Samar
    24 Mar 2015 | 8:45 am
    Two Syracuse University alumni have been selected to participate in the American Library Association Emerging Leaders program. This annual networking and leadership development program is designed to launch newer library workers’ participation in the ALA and other professional organizations. Participants meet at the ALA Midwinter Meeting to form into workgroups, which tackle specific projects throughout the next six months and present their results at the ALA Annual Conference. Participants may then be offered appointments to ALA committees, task forces, or workgroups. Alumni Amanda…
  • add this feed to my.Alltop

    InfoZonePK

  • Ufone Introduces Umall: An Online Shopping Portal

    InfoZonePK
    31 Mar 2015 | 9:20 pm
    Ufone has introduced an online shopping portal ‘Umall’. It is accessible 24/7 as a free downloadable Android application from Google Play Store or by visiting umall.pk. Ufone says that Umall is going to revolutionize the way Pakistan shops online. Browsing for items on the mobile application is totally free for Ufone customers and products can […]
  • PTCL Celebrates ‘International Women’s Day’

    InfoZonePK
    31 Mar 2015 | 9:10 pm
    PTCL celebrated the ‘International Women’s Day’ to acknowledge its female employees and highlight their role in company’s success. This year’s theme, ‘Make It Happen’, challenges the stereotypes and reflects the changing perceptions about what women can do and how they are achieving success in all areas of life. Maj. General (Retd) Shahida Badsha and Deputy […]
  • Mobilink Receives WWF Green Office Award

    InfoZonePK
    31 Mar 2015 | 9:00 pm
    Mobilink has become the only telco to have received the Green Office Certification for three of its business premises in Lahore and Islamabad. The latest WWF Green Office Award 2015 was granted after its Head Office, Mobilink House and adjacent IBC II building, Islamabad premises were successfully audited for their consumption of electricity, paper and […]
  • Vivid Technologies Secure $ 350k Worth of Funding

    InfoZonePK
    30 Mar 2015 | 9:20 pm
    Vivid Technologies, a startup previously incubated at Plan 9 and accelerated at LUMS Center for Entrepreneurship has just closed seed stage funding of $ 350 K from a combination of investors, consisting of Sunbridge Ventures, Rosemont Group, Telefonica, and Conrad Labs. Omer Khushnood, CEO Vivid Technologies is extremely encouraged by the faith of all the […]
  • Warid Employees Donate Blood for Thalassemia Patients

    InfoZonePK
    30 Mar 2015 | 9:10 pm
    As part of its CSR initiative, Waird Telecom organised a blood donation drive at its Lahore offices. Employees of Warid Telecom generously participated in this and accumulated large quantity of blood for patients suffering from Thalassemia. Warid has partnered with the Sundas Foundation in the past over shared concerns about blood donation. This year they […]
  • add this feed to my.Alltop

    Complete IT Professional

  • Oracle TRUNC Function Explained with Examples

    Ben
    26 Mar 2015 | 4:00 am
    The TRUNC function is one of the most common and versatile functions in Oracle. Let’s take a look at how it’s used and some examples.Purpose of the Oracle TRUNC FunctionThe purpose of the Oracle TRUNC function is to truncate either a number or a date value.The TRUNC function works on two different data types – number or date. This means you can provide it with either of these two data types, and the TRUNC function will perform slightly differently and give you a result for that data type.If you supply it a date data type, then it will return the portion of that value as…
  • What Is The System Analyst Job Description?

    Ben
    23 Mar 2015 | 4:00 am
    Have you heard of the “System Analyst” job title? Perhaps you are a System Analyst and want to find out what the actual description is. Learn what the system analyst job description is in this article.System Analyst Job DescriptionThe job description of a system analyst is:A system analyst looks at existing IT systems to analyse, design, and implement new IT solutions, or modify existing IT solutions.That’s the short answer. If you’ve been around IT for any length of time, you might have seen people or worked with people who fit this description. They also might seem…
  • Oracle CONCAT Function with Examples

    Ben
    19 Mar 2015 | 4:00 am
    The Oracle CONCAT function is not a very widely used function, but still helpful. Learn more about the CONCAT function in this article.Purpose of the Oracle CONCAT FunctionThe Oracle CONCAT function allows you to join, or concatenate, two strings together. It’s part of standard string manipulation in many programming languages.For example:string1 = “Yes ”string2 = “Please”To concatenate these strings means to join them together.string3 = “Yes Please” SyntaxThe syntax of the Oracle CONCAT function is:CONCAT( string1, string2 )The string that is…
  • Announcing “Software Developer Academy”

    Ben
    19 Mar 2015 | 2:45 am
    I’ve just made my new online training platform available for the public. Find out more about it in this article.So, after months of planning and setting up, I’ve finished setting up Software Developer Academy. It’s available at SoftwareDeveloperAcademy.com.Is this the first you’ve heard about it? If so, read on. If you’re subscribed to my newsletter, you would have been given early access, but this article is still helpful for you. What Is Software Developer Academy?Software Developer Academy is a new online training platform, or website, developed by…
  • Ruby on Rails vs PHP – A Comparison

    Ben
    16 Mar 2015 | 4:00 am
    Ruby on Rails and PHP are two very popular ways to create web applications. But how do you choose which one you want to use? Ruby on Rails or PHP? Let’s look at the differences in this article.What are Ruby on Rails and PHP?If you’ve spent any time around developers in the last few years, you would have heard of Ruby on Rails. Ruby on Rails is actually a combination of two technologies – Ruby, which is the programming language, and Rails, which is a framework built on top of the Ruby language.It’s quite a popular way to build websites and web applications these…
 
  • add this feed to my.Alltop

    Captain DeadBones Chronicles

  • Best iPad Image Editing Apps for 2015

    bob
    16 Mar 2015 | 3:54 am
    Whether you're in photojournalism, interior design or graphic artistry, the power of mobile technology has brought some exciting new tools to image editing. Gone are the days of manual image manipulation or being chained to a computer to perform time-consuming rendering procedures. Operations that used to take hours now can be performed in minutes with these apps and a powerful iPad. Here are your best iPad image editing apps for 2015: Hipstamatic The introduction of the iPad Air 2 gives users professional-grade cameras that allow click, edit and publish functions. Although the quality is…
  • Have you tried out Spyder-IDE for Python Dev?

    cptdeadbones
    12 Mar 2015 | 4:22 am
    Personally, I am not much on an IDE person. I love a good plain text editor and a command  line tool. However, Spyder is not that bad. You can download it from the Spyder bit bucket repository. Give it a try. It works right out of the box. There are 3 main sub windows, a color coded text editor, a variable table and a console output. The first time you open it you should see something like this: Let's run a sample program, something like this: #trial run Spyder IDE x = input("Enter a number: ") y = raw_input("Enter another number: ") try: z = x*y except: print…
  • 5 Tools to Protect Your Online Privacy

    janitor
    9 Dec 2014 | 4:21 am
    Companies may know you better than you think. According to an FTC study, brokers regularly collect an individual's personal data based on their online activity. They can find out your Social Security number, how you pay for things, your children's ages and even the kind of vacations you take. It's no wonder you're worried about your privacy! Fortunately, by using the right tools to protect yourself online you can decrease the chances of having your data sold to brokers and keep your personal information private. Browsing What we search for on Google reveals a lot about us. Its privacy policy…
  • A Lesson about History, Objects, Classes, Time and Python

    cptdeadbones
    3 Dec 2014 | 3:39 am
    Object Oriented Programming (OOP) became very popular in the last couple of decades. I do find that a lot of people can tell me what an Object is, but few know what is the difference between a class and Object. In fact, many use them interchangeably. So let us clear the air a bit. Here is a short nice story about the evolution of programming. Sort of. In the dawn of programming we had variables. For a time it was good. Char, Int, Sting, Float all run along nicely. For us programmers that was not enough. We like to make life more complex than that. So we start writing code. A lot of code. Code…
  • Diffie-Hellman Key Exchange Video

    cptdeadbones
    18 Nov 2014 | 3:27 am
    The post Diffie-Hellman Key Exchange Video appeared first on Captain DeadBones Chronicles.
  • add this feed to my.Alltop

    MJ Flood Technology

  • Join our Webinar: Windows Server 2003 End of Support

    Deirdre
    18 Mar 2015 | 6:08 am
    Join our webinar on Wednesday, 15th April next and discover how to use the EOL for Windows Server 2003 deadline to transform your IT for the future. Register now. The post Join our Webinar: Windows Server 2003 End of Support appeared first on MJ Flood Technology.
  • How to solve our biggest communications problem

    Deirdre
    10 Mar 2015 | 2:26 am
    In the first half of 2015, Microsoft will launch a new platform that brings together the power of telephony, voice mail, audio conferencing, video conferencing and instant messaging in one enterprise-grade, easy-to-use application. The post How to solve our biggest communications problem appeared first on MJ Flood Technology.
  • Top Three Telco Tips to Becoming a True ICT Provider

    Deirdre
    2 Mar 2015 | 5:31 am
    The move to the cloud has created disruption in the market. Here are the top three tips, from Brian Murphy, director of cloud services to help organisations in their transition from traditional telco to full ICT provider. The post Top Three Telco Tips to Becoming a True ICT Provider appeared first on MJ Flood Technology.
  • Windows Server 2003 End of Life – the risks of ignoring this important deadline

    Deirdre
    17 Feb 2015 | 8:47 am
    With so many instances of Windows Server 2003 out there, many companies will be asking themselves what kind of support they can expect to receive after this date. And the answer, quite frankly is none. The post Windows Server 2003 End of Life – the risks of ignoring this important deadline appeared first on MJ Flood Technology.
  • Windows Server 2003 Migration Guide

    Deirdre
    16 Feb 2015 | 8:01 am
    The post Windows Server 2003 Migration Guide appeared first on MJ Flood Technology.
 
  • add this feed to my.Alltop

    TheITBros

  • 5 Reasons Why You Should Build Your Own Computer

    The IT Bros Team
    12 Mar 2015 | 9:31 pm
    If you need a new desktop computer, you may be thinking of buying a pre-built machine from a manufacturer such as HP or Dell. However, there is another option – build your own. Enthusiasts have been doing this since PCs first hit the market, either to save money or just for the fun of it. Today, with cheap PCs available for $400 or less, some experts will tell you that there is no longer any reason to do it yourself. However, they are completely wrong. There are still many good reasons to build your own computer – and here are just a few. 1. Quality components When you walk into your…
  • 16 Open Source Alternatives for Your Favorite Programs

    The IT Bros Team
    5 Feb 2015 | 8:33 pm
    In this information age, the words “paid” and “proprietary” seem to be among the dirtiest words that you can possibly slap on a piece of software. But let’s face it- lots of people use commercially-made software on a daily basis whether they like it or not, often paying a premium price for functions that they could’ve gotten for free… Yes, you read that right. FREE. And “free” here does not merely mean that you can get software without paying money for it. This is free in the sense that you can do anything you want with the software-…
  • Top 5 Most Common Computer Problems And How To Fix Them

    The IT Bros Team
    17 Jan 2015 | 2:13 pm
    On a daily basis millions of people who use either a PC or laptop are bombarded with various problems and while some of them are really simple to solve, some are so annoying and persistent that they can drive you crazy. Well, if you’re one of those who is sick and tired of having windows popping up on your screen without you do anything or if your computer keeps randomly restarting, then “we have a case” as a lawyer would say. Because of that, below we’re going to take a close look at the top 5 most common computer problems and how to easily solve them. Let’s get…
  • Essential Productivity Apps for the Mobile Freelancer

    The IT Bros Team
    14 Jan 2015 | 5:00 am
    Being a freelancer is hard work– despite what most people would think. The idea of working from home in your pajamas would seem like an ideal working scenario for some, but having no bosses around to keep tabs on you can result into your productivity going into a nosedive. Before you know it, you’re browsing through celebrity gossip sites or looking up random facts on Wikipedia instead of working on that report. Hours pass by, the day ends, and you find yourself with absolutely nothing to show for the lost time. Thankfully, there are a lot of FREE productivity tools on the Web…
  • Linux Mint for Noobs – Getting Started

    The IT Bros Team
    13 Jan 2015 | 12:00 pm
    Windows is easy and familiar. It has been the de facto operating system on most computers for the past twenty years or so- and for the majority of people who use PCs, it’s the only operating system that they know of. It’s easy to see why some people are hesitant on making the leap to other operating systems. What is Linux Mint? But if you do find yourself getting more and more enthused about moving away from “evil” corporate Windows and into the free world of open source Linux, then consider getting Linux Mint as your beginner distro! Often touted as the ultimate…
  • add this feed to my.Alltop

    About G2 Crowd

  • G2 Crowd Publishes Spring 2015 Rankings of the Best Digital Asset Management Software

    Daniel Honigman
    31 Mar 2015 | 1:00 am
    Six platforms earn High Performer status while Widen Media Collective tops overall satisfaction rankings in crowdsourced report CHICAGO – March 31, 2014 – The first Grid℠ report for digital asset management software, published today by business software review site G2 Crowd, ranks 11 products to help purchasers in their selections. The Spring 2015 report is based on more than 200 reviews written by business and content professionals. The Grid℠, which is created from G2 Crowd’s software review platform, factors in customer satisfaction reported by users and vendor market presence…
  • G2 Crowd Publishes Spring 2015 Rankings of the Best Social Advertising Platforms

    Daniel Honigman
    26 Mar 2015 | 3:59 am
    Two platforms earn Leader status while Marin Software tops overall satisfaction rankings in crowdsourced report CHICAGO – March 26, 2015 – The first Grid℠ report for social advertising platforms, published today by business software review site G2 Crowd, ranks eight products to help purchasers in their selections. The Spring 2015 report is based on data from more than 150 reviews written by advertising professionals. The Grid℠, which is created from G2 Crowd’s software review platform, factors in customer satisfaction reported by users and vendor market presence determined from…
  • The Hidden Costs of Switching Software Vendors

    Daniel Honigman
    25 Mar 2015 | 5:39 am
    Guest post written by Marc Prosser  Disclaimer: Guest posts don’t necessarily reflect the views of G2 Crowd. You are close to making a decision about changing CRM solutions. The decision to change providers look like it will save $10,000 or more a year for the company, without having to sacrifice any functionality or service which is currently being provided. Before you finalize the order, however, it’s important to make sure you’ve factored in all the hidden costs of switching to a new provider – the cost of training, lost productivity and custom integrations. Only then can you…
  • G2 Crowd Publishes Spring 2015 Rankings of the Best Social Media Monitoring Platforms

    Daniel Honigman
    24 Mar 2015 | 5:44 am
    Brandwatch earns Leader status and tops overall satisfaction rankings in crowdsourced report CHICAGO – March 24, 2015 – The updated Grid℠ report for social media monitoring tools, published today by business software review site G2 Crowd, ranks 12 products to help purchasers in their selections. The Spring 2015 report is based on data from more than 400 reviews written by business and marketing professionals. The Grid℠, which is created from G2 Crowd’s software review platform, factors in customer satisfaction reported by users and vendor market presence determined from social and…
  • The 4 Things You MUST Consider Before Investing in Marketing Automation

    Daniel Honigman
    19 Mar 2015 | 6:20 am
    Guest post written by Patrick Biddiscombe Disclaimer: Guest posts don’t necessarily reflect the views of G2 Crowd. In recent years, the need to invest in a CRM platform has become accepted as a basic practice for nearly all businesses looking to manage a sales force and grow their business. However, as marketing automation has gained increasing prevalence and adoption over the past five years — exemplified by the growth of Marketo, Pardot and HubSpot, among others — questions still remain for many businesses as to when it makes sense to invest in marketing automation. Here are four key…
 
  • add this feed to my.Alltop

    accellion.com

  • The Popularity of Native Apps Ups the Ante for Mobile Security

    Posted by Yorgen Edholm
    31 Mar 2015 | 12:00 am
    Mobile users prefer by a wide margin native apps written to run specifically on mobile operating systems such as Android or iOS, to browser-based apps, according to a recent survey by mobile analytics firm, Flurry. On average, mobile users are spending almost three hours a day on their devices, and...
  • Developers Beware: Security Vulnerabilities Resulting from Poor Coding Practices

    Posted by Vidhya Ranganathan
    24 Mar 2015 | 12:00 am
    Enterprise organizations interested in developing their own mobile apps would benefit from reading HP Security Research’s new Cyber Risk Report 2015 . The report presents an in-depth look at enterprise IT security overall, and like other security reports, it calls attention to the threat of...
  • The Time is Now for Enterprise-friendly Apps

    Posted by Paula Skokowski
    16 Mar 2015 | 12:00 am
    It seems there’s an app for just about everything these days, including apps to improve our exercise regimes, our restaurant choices, our driving routes, and even our relationships. In July of 2014, Android users had 1.3 million apps available for download; Apple users, 1.2 million, and those...
  • Hackers Increasingly Targeting Mobile Devices

    Posted by Vidhya Ranganathan
    10 Mar 2015 | 12:00 am
    Hackers are increasingly targeting mobile devices, according to a recent report from RSA. As the company’s Daniel Cohen remarked in an interview at BankInfoSecurity.com , the sheer number of smartphones and tablets all but guarantees that hackers will target these popular devices. The growth...
  • Learning to Ride the Mobile Customization Wave

    Posted by Yorgen Edholm
    3 Mar 2015 | 12:00 am
    The BYOD trend is unstoppable and enterprises are now living in a BYOD-centered world. A mobile workforce of tech-savvy employees is now storing mission-critical business documents on their own devices, ranging from laptops to smartphones to smart watches. Because of this, enterprise apps are...
  • add this feed to my.Alltop

    Plexxi

  • PlexxiPulse—Reflecting on Arrow’s IoT Immersions Conference

    Mat Mathews
    27 Mar 2015 | 11:03 am
    We took a short ride to Boston this week’s for Arrow’s Internet of Things Immersions Conference. Dave Husak, our CTO and EVP of products and technology, participated in a panel alongside executives from Arrow, EMC, Intel, NXP and Oracle to discuss the role software defined networking will play in future Big Data deployments. Dave spoke to why innovative infrastructure is necessary to manage mixed workloads and big data jobs of different priorities. Interested in seeing Plexxi in action? We’ll be on the road for the next few months—stay tuned or drop us a line at info@plexxi.com for…
  • Plexxi Pulse – Bringing Data to Life at Arrow’s IoT Immersions Conference

    Mat Mathews
    20 Mar 2015 | 12:49 pm
    Next week, our co-founder, CTO and EVP of products and technology, Dave Husak, will be heading to Arrow’s Internet of Things Immersions Conference to participate in two panels. The event will be held on March 26 at the Hynes Convention Center in Boston, MA. The first panel Husak will join will weigh in on the topic “Bringing Data to Life: How to Turn Data Intelligence into Actionable Sales Growth.” Husak will be joined on this panel by other industry thought leaders from Arrow, EMC, Intel, NXP and Oracle. Husak and the other panelists will analyze how to effectively harness massive…
  • PlexxiPulse—Arrow IoT Immersions in Boston 3/26

    Mat Mathews
    13 Mar 2015 | 12:30 pm
    Last week, we were in Santa Clara, California for Arrow Electronics’ Internet of Things Immersions conference. We demonstrated our big data fabrics, learned about Arrow’s #FiveYearsOut philosophy and conversed with innovators and thought leaders from businesses, government agencies and academia. We will be exhibiting at the last installment of the Immersions conference in Boston on March 26 at the Hynes Convention Center. Come see Plexxi in action and to talk with our team about the next era of IT. You can register to attend here. We can’t wait to see you! Below please find a few of our…
  • PlexxiPulse—What Does a Third Era Network Look Like?

    Mat Mathews
    6 Mar 2015 | 8:59 am
    You may have noticed that we’ve been spending some time out west demonstrating our big data fabrics and sharing our vision for the third era of networking. You’ll be seeing more meet-ups and live demonstrations in the near future, so keep an eye on the blog and on Twitter to see where we are headed next. In the meantime, can you name the 5 main characteristics of a third era network? Hint: the answer is somewhere on the Plexxi website. Tweet us your answers for the chance to win some Plexxi swag. We can’t wait to hear from you! Below please find a few of our top picks for our favorite…
  • Plexxi Heads West: Big Data for Business

    Mike Welts
    3 Mar 2015 | 5:00 am
    Big data – a buzzword that every industry is trying to wrap its head around. But what does it mean for networking? Plexxi’s Ed Henry had the opportunity to discuss big data fabrics and Plexxi’s perspective on tackling big data in networking at a Big Data for Business Meet-Up in Denver. Ed shared insight into both the hardware (the components and switches) and software (affinity groups and links) and how the combination of the two is necessary to manage big data. Plexxi’s hardware/software approach integrated with Cloudera Manager allows companies to manage big data clusters and…
  • add this feed to my.Alltop

    GlobalDots - CDN, Security and Performance Solutions

  • Streaming: Adobe HLS

    Francesco Altomare
    1 Apr 2015 | 4:30 am
    Welcome back to the Second Article pertaining to our Streaming MiniSeries; in the previous, opening Article, we introduced Streaming as a high level concept in the Delivery Panorama and focused on Streaming via RTMP, an Adobe proprietary Protocol. Today , our technical journey into Adobe proprietary Streaming technologies continues by taking a closer look at HLS , also known as HTTP Live Streaming, aka Adobe’s compliance to Apple’s diktats: this is peculiar as it is one of the few proprietary technologies compatible with all iDevices, as well as its general adoption since introduction has…
  • Google, MaxCDN and PeerApp in this Weeks News Roundup

    Goran Čandrlić
    25 Mar 2015 | 3:37 am
    Google Security Temporarily Compromised by Fake Digital Certificates The company revealed today that it has discovered several fake digital certificates for some of its domains. Google says it promptly alerted the certificate authority, CNNIC, after discovering the fakes. MCS appears to have flouted protocol and installed replacement certificates in a highly nonsecure manner. Image source Google did not say which domains were affected, but it did note that it has fixed the problem, that Chrome users do not need to take any further action, and that it is considering whether further responses…
  • Streaming: Adobe RTMP Explained

    Francesco Altomare
    24 Mar 2015 | 5:55 am
    Today we open another Posts Mini-Series, this time around we’ll focus on Streaming. As you may know , we are Streaming enthusiasts and most part of our daily business revolves around assisting and consulting on Streaming Solutions. Now that we think of it, this introductory Streaming Posts Mini Series should have come way earlier in our Blog, but given that we’re into so many Projects, and given that we wanted to first close the circle around what we’d be going to cover into it we’ve preferred waiting until today. Today’s Post opens the arena talking about RTMP Streaming, that is ,…
  • Xerocole Acquired By Akamai, Limelight in the spotlight and more news

    Goran Čandrlić
    16 Mar 2015 | 3:27 am
    Xerocole Acquired By Akamai In A Cash Transactio Akamai Technologies, the global provider of CDN, announced that it had acquired Xerocole, a provider of recursive DNS functionality. Xerocole’s intelligent recursicve DNS technology enables carriers to not only have more speed and security of mapping domain names to IP addresses, but also allows flexibility to set DNS policy based on user preferences. Akamai announced it’s satisfaction over the Xerocole acquirement which means upgrading the company’s DNS product portfolio. Both parties were satisfied over the agreement. Image…
  • FBI Offers Record Reward for Hacking, Steam and PC in favor of game developers, Instart Logic develops new platform

    Goran Čandrlić
    5 Mar 2015 | 7:35 am
    Game developers favor Steam and PC over other platforms About 75 percent of game developers say that Steam and the PC platform is “very important” for the future of the game industry, according to a survey by the International Game Developers Association. The survey of 2,200 developers show that many view the PC as the top platform for the next five years. And 25 percent of developers said that “proprietary platforms” such as virtual reality are also very important. The issue of diversity in game content has been a huge issue in the past year. Seventy-four percent of developers rank…
 
  • add this feed to my.Alltop

    PagerDuty

  • Not Enough Cat Photos? Introducing OkCats

    Dave
    1 Apr 2015 | 5:00 am
    PagerDuty soothes you with pretty kitties PagerDuty alerts. Feeding a newborn gremlin. FOMO. These are the things that keep us up at night. Here at PagerDuty, we know that nothing settles the nerves like eye cuddling a fluffy, adorable cat. That why we’re proud to announce OkCats. OkCats puts cat photos where they’re needed most: in your incidents. Now any PagerDuty-enabled service can be embedded with calming pictures of cats. Waking up at 3am just got a whole lot fuzzier. Take advantage of OkCats We’ve extended our events API to include both images of cats and links to even more cats.
  • Will Automated Alerting Replace the NOC?

    Sam Lewis
    26 Mar 2015 | 11:45 am
    How alerting & incident management solutions enhance (not replace) the NOC Image source If you have a Network Operations Center (or NOC, as the kids call it), you have a skilled set of eyes monitoring your system and alerting your engineers when things go wrong. (If you have something like a NOC, such as a first tier team that processes tickets, we’re looking at you, too). You also probably have strict SLAs and a need for high availability at all times. You can’t waste a second when things go down. Solutions like PagerDuty that help you identify and resolve incidents faster can help…
  • Flowdock and PagerDuty Integration Update

    Sam Lewis
    24 Mar 2015 | 6:02 pm
      This is a guest post written by Ville Saarinen of Flowdock. It originally appeared on the Flowdock blog. When your service goes down, there’s no time to waste. With sweaty palms and an elevated heart rate, you need to figure out what’s wrong, all while communicating your status to your users. Coordinating with your team is complex enough – there’s no room for unnecessary actions. This is where Flowdock’s new and greatly improved PagerDuty integration comes into play. PagerDuty helps you resolve incidents faster. It integrates with your monitoring tools to quickly notify…
  • Best Practices in Customer Outage Communication

    Sam Lewis
    20 Mar 2015 | 11:56 am
    This is the first post in our series on best practices in communication during critical incidents. Outages are chaotic, and it can be difficult to figure out the best way to let your  customers know what is going on. One of the first big decisions you’ll need to make is whether you’re going to respond only to people who inquire about the issue, or if you’re going to be more proactive and post updates publicly. Many of the leading technology companies have begun to transparently discuss outages with their customers, and there are a number of good business reasons for doing so.
  • Cool Things You Can Do with the PagerDuty API

    Sam Lewis
    12 Mar 2015 | 1:50 pm
    Extend PagerDuty with our API One of the great things about PagerDuty is our API. With our API, you can integrate with a wide variety of partners, and also extend and customize your PagerDuty experience. Our customers have done a number of cool things, including creating custom reports and dashboards, creating status pages to let customers and internal stakeholders know about incidents, and automating the details of their incident response. The PagerDuty API helps you respond to incidents more efficiently. But where do you get started? We’ve highlighted some great add-ons below to help…
  • add this feed to my.Alltop

    Information Security Buzz

  • Netwrix Freeware Helps to Prevent Inside Jobs

    muhammad malik
    1 Apr 2015 | 3:55 am
    You're reading Netwrix Freeware Helps to Prevent Inside Jobs originally posted on Informationsecuritybuzz.com. If you've enjoyed this post, be sure to follow informationsecuritybuzz.com on Twitter, Facebook, Linkedin and Google+ Netwrix Freeware Helps to Prevent Inside Jobs is a post from: Information Security Buzz. If you've enjoyed this post, be sure to follow us on Twitter,Facebook, Linkedin and Google+! Netwrix strengthens internal security and eliminates privilege abuse with reporting on who has access to what 1 April 2015: Netwrix has announced the release of its Netwrix Effective…
  • Comments on Hilton Honors Accounts Hijacked

    Fawad Nisar
    31 Mar 2015 | 5:05 pm
    You're reading Comments on Hilton Honors Accounts Hijacked originally posted on Informationsecuritybuzz.com. If you've enjoyed this post, be sure to follow informationsecuritybuzz.com on Twitter, Facebook, Linkedin and Google+ Comments on Hilton Honors Accounts Hijacked is a post from: Information Security Buzz. If you've enjoyed this post, be sure to follow us on Twitter,Facebook, Linkedin and Google+! Igor Baikalov, chief scientist at Securonix (www.securonix.com), provided the following analysis of reports of a powerful flaw in the Hilton Hotels site that lets anyone hijack a Hilton…
  • Analysis of a real Drupal Compromise

    Fawad Nisar
    31 Mar 2015 | 5:05 pm
    You're reading Analysis of a real Drupal Compromise originally posted on Informationsecuritybuzz.com. If you've enjoyed this post, be sure to follow informationsecuritybuzz.com on Twitter, Facebook, Linkedin and Google+ Analysis of a real Drupal Compromise is a post from: Information Security Buzz. If you've enjoyed this post, be sure to follow us on Twitter,Facebook, Linkedin and Google+! Ryan Barnett,Senior Lead Security ResearcherTrustwavehas analysed a real-world web compromise exploiting a Drupal SQL injection vulnerability (a.k.a. Drupalgeddon) that enables criminals to take control of…
  • Beyond Data Investment: How Marketers Can Achieve the Greatest ROI

    Fawad Nisar
    31 Mar 2015 | 5:05 pm
    You're reading Beyond Data Investment: How Marketers Can Achieve the Greatest ROI originally posted on Informationsecuritybuzz.com. If you've enjoyed this post, be sure to follow informationsecuritybuzz.com on Twitter, Facebook, Linkedin and Google+ Beyond Data Investment: How Marketers Can Achieve the Greatest ROI is a post from: Information Security Buzz. If you've enjoyed this post, be sure to follow us on Twitter,Facebook, Linkedin and Google+! Data’s role in marketing is ever-evolving. Companies are maintaining their pace of investment in data studies and strengthening the…
  • Putting identity at the heart of security in 2015

    Fawad Nisar
    31 Mar 2015 | 5:05 pm
    You're reading Putting identity at the heart of security in 2015 originally posted on Informationsecuritybuzz.com. If you've enjoyed this post, be sure to follow informationsecuritybuzz.com on Twitter, Facebook, Linkedin and Google+ Putting identity at the heart of security in 2015 is a post from: Information Security Buzz. If you've enjoyed this post, be sure to follow us on Twitter,Facebook, Linkedin and Google+! Hans Zandbelt, Senior Technical Architect at Ping Identity, discusses the role identity will play in securing and enabling broader internet in 2015. In 2014 we saw connected homes…
 
  • add this feed to my.Alltop

    A Tech Journey

  • Reset Windows 8.1 to original settings without re-installing

    Anup Raman
    28 Mar 2015 | 10:13 am
    We all know Windows OS is prone to variety of issues. The OS is constantly under threat from viruses and malware. There is the possibility of software compatibility issues which might mess with file integrity and corrupt files. The result, you might end up with a messed up OS. Majority of these issues can be […]
  • Unlock the secret game in Lollipop

    Anup Raman
    27 Mar 2015 | 5:09 am
    Android starting from Gingerbread comes with a surprise hidden inside. It’s no exception to the latest Android version, Lollipop. This is so far the best Easter bunny ever released by Google. This is how to unlock the secret game in Lollipop. Go to Settings Open About Phone or About device or About Tablet Keep tapping […]
  • Is it worth replacing old SSD with a new one?

    Anup Raman
    27 Mar 2015 | 5:08 am
    One of the greatest contribution in hardware towards achieving a faster computer is the introduction of SSD (Solid State Drive). SSD is already a necessary component in gaming PC’s and some of the medium and highly priced desktops and laptops. Why should you install SSD Some of you might have already adopted SSD long time […]
  • 10 interesting facts about latest web protocol HTTP/2

    Anup Raman
    20 Mar 2015 | 6:11 am
    The HTTP that we are all familiar with is going to get a new version soon. Here are some details about the latest web protocol HTTP/2. HTTP (Hypertext Transfer Protocol) was first used sometime in 1991. The only update to it HTTP/1.1 was released in June 1999. HTTP/2, the latest update is developed by IETF […]
  • Fix “The operation has been cancelled due to restrictions in effect on this computer” message

    Anup Raman
    20 Mar 2015 | 6:11 am
    The operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator. This error message usually happens when you try to send an email message by clicking on the webpage link. When the link is clicked, it should open automatically open your default email client, usually Outlook. Instead, you […]
  • add this feed to my.Alltop

    FactsnFakes

  • 4 Best WordPress Plugins to Improve Website’s Revenue

    Sumanth Veera
    26 Mar 2015 | 1:19 pm
      You should always remember to develop your quality level of visitors by persuading them to remain on your website for long time and have a close observation on more pages available on your site, but at the same time you should also known how to make more money. Who doesn’t want to gain extra money? ‘Revenue boosting’ signifies a perfect sales equation of your website. When traffic or conversion rate value increases, they both will straightaway enhance revenue. That’s why we’ve mentioned here 4 best free WordPress plugins which will easily improve your WordPress…
  • Facebook and Reliance Communications Launches Internet.org in India

    Sumanth Veera
    5 Mar 2015 | 8:21 pm
    Image by internet.org It may not seem to be true but as the above image states, two-thirds of the world is still not connected to the Internet. Internet.org is an initiative by Facebook to bring Internet access to all those “offline” parts of the world. Internet.org is an app which lets its users unlimited access to select websites (but not limited) completely free of charge. At first, Facebook launched the app only in select countries (those with less internet availability) planning carefully step and step. At the end of last year, Facebook hosted the first Internet.org meet in…
  • How to become a more friendlier person?

    Vivek
    26 Feb 2015 | 9:12 am
    Every one likes a friendly, nice guy who always helps you when you want some help. Those are the type of guys people usually tend to be more comfortable around. Those are the type of people with whom you usually share all your secrets. They know everything about everyone but still they want to listen to the other half of the story just because they don’t want to be judgmental. A friendly person is always respected wherever he goes and whatever he does. Everybody wants to hear out his ideas. So how can you become a friendlier person in order to gain respect and become a more trustable…
  • Download DreamShot Screen Capture Tool for Mac for Free

    Sumanth Veera
    14 Feb 2015 | 3:57 pm
    Here we are again with an awesome freebie. But this one is only for Mac users. This is a Screen Capture tool for Mac. We have listed out a few details about this tool. We have also included a little video about this tool.  Hope this will be useful to you for some extent. Anyway you can get the download link below this article. DreamShot rids your desktop of screenshot clutter, and best of all, requires next to no effort. Choose your preferred keyboard shortcut to take a screenshot in an instant, and then seamlessly send it to any app, service, or destination on your Mac from a list that will…
  • 5 Best Sites To Learn Java Online For Free – Part 1

    Sumanth Veera
    11 Feb 2015 | 8:24 am
    Programmers had a lot of demand from the start itself, especially Java programmers. It’s estimated that an average programmer earns more money in a month than an average non-IT guy earns in a year. When it comes to Java programmers this number might be even more. So most people these days are looking to prep their career in Programming, even the non-IT folks. That’s actually a great move, but there is one big problem here. That is the cost to learn Java Programming.  Programming is taught by a lot of Universities, Coaching Centers, Bootcamps etc.., but the price is so high that a…
  • add this feed to my.Alltop

    Certification Magazine

  • New Office Pro product from TestOut tackles Microsoft Office 2013

    CertMag Staff
    31 Mar 2015 | 7:09 pm
    It’s Microsoft’s world and the rest of us are just living in it. Especially for people who work in a modern office setting, that’s the proverbial perception that equals reality. If you need to create a document, then you use Word. For a spreadsheet, it’s Excel. And PowerPoint is one of those brand names, like Kleenex and Xerox, that’s essentially become synonymous in the English language with the product it brands. Having a strong working knowledge of Microsoft Office products is a skill that’s richly rewarded: In our recent 2014 Salary Survey,…
  • Oracle Learning Streams: A valuable training and certification asset?

    Matthew Morris
    30 Mar 2015 | 5:38 pm
    The only constant in the information technology field is that it is always changing. Professionals in the field must continually learn how to use new features, languages, hardware capabilities and more in order to provide value to their employers. High quality training at a compelling price is something I always keep an eye out for. So when Oracle Learning Streams was announced in June of 2014, it immediately caught my attention.Over the years I have taken a significant number of courses from Oracle University and always found them to be valuable. Unfortunately, Oracle’s training is some of…
  • Salary Survey: Preferred methods of getting a certificaton

    CertMag Staff
    27 Mar 2015 | 12:30 pm
    Once you’ve gotten aboard, the certification train just keeps rolling on down the tracks. Just like with a real train, of course, nobody rides for free — generally speaking — which is one of the first things we like to ask about when giving an overview of the certification process and survey respondents’ preferred methods of getting things done. Who’s paying for all of this?Based on this year’s results, there are basically two options: Pay the total cost yourself, or pass the buck to your boss. About 23 percent of those surveyed paid for their most recent credential out of…
  • Salary Survey PLUS — Big Data

    CertMag Staff
    26 Mar 2015 | 2:08 pm
    There’s money in Big Data. We’ve all heard someone say it. Businesses and other organizations routinely collect and store information. Sometimes it’s information about consumer behavior, or consumer demographics. Sometimes it’s information about transactions, or business interactions. Sometimes it’s information that directly corresponds to a business need, and sometimes it’s information that doesn’t appear to serve any purpose at all.It used to be difficult to collect, store and process all of that information, but rapidly advancing technology has…
  • IT around the world: Peeking over the Great Firewall of China

    Mike Chapple
    24 Mar 2015 | 4:34 pm
    Visitors from many nations flock to China to view one of the world’s architectural marvels: the Great Wall of China. China’s imperial rulers first erected this monumental defensive barrier more than 2,000 years ago to keep out invading armies. Today, China uses a more high-tech wall that functions in reverse, keeping Chinese citizens “inside” when they attempt to access the Internet, as well as limiting foreign influences: the Great Firewall of China.The Great Firewall, also known as the Golden Shield, isn’t a single security device. Rather, it is a collection of technologies from…
 
  • add this feed to my.Alltop

    Hi-Tech ITO » Hi-Tech ITO Blog

  • New Rules of Secure Data Network for Enterprise Mobility Management in 2015

    Chirag Shivalker
    16 Mar 2015 | 3:40 am
    Work-while-you-are-on-a-go! – This has become the primary motto of today’s fast-moving world. And now, with the competition getting tougher and pressure to excel mounting inadvertently has resulted in the rise of Enterprise Mobility Management! This has given immense liberty and “mobility” to the employees to carry on with the essential operations from anywhere – Even while they are on a business trip or at the office. So, the end-story of this is to ensure that the work does not get hampered. In fact, the past year belonged to enterprise mobility management– We, actually…
  • Get Smarter Business Analytics Report with CRM Business Intelligence

    Chirag Shivalker
    3 Mar 2015 | 4:21 am
    Business analytics today is more about CRM integration and business intelligence to analyze past events and make near-accurate predictions that can influence the future strategies. Earlier, business analytics was considered to be a very boring practice done only by a handful of hard-core people trained in the deep areas of data access, mining, analysis, and, the most natural one, data warehousing. And those days no longer exists! They have become a thing of past. While the targets of business analytics (BA) still remain the same; i.e., to collect and understand the data to ensure that better…
  • Building an Intelligent Organization – BI, UDM and Data Analytics Strategies

    Chirag Shivalker
    20 Feb 2015 | 2:11 am
    What should a good unified data management and analytics strategy look like? Here we explain it in three critical steps. Today in the age of digitization and information exchange, we are knowingly or unknowingly contributing to an infinite pool of data. In most of the organizations, this ever increasing data is managed in isolated silos. This data is processed using various tools for data quality, data integration, information governance, master data and metadata management, B2B data exchange, content management etc, to name a few. Data management, processing and analysis, to derive…
  • How Microsoft Dynamics CRM helps to Drive Revenue & Serve Customers?

    Chirag Shivalker
    17 Feb 2015 | 2:00 am
    Every great business is built on customer relationship. Product or price advantage can be easily copied, however building a strong customer service culture cannot be duplicated. Microsoft dynamics CRM helps businesses build effective customer service culture by helping them manage customer interactions and hence develop profitable relations with them. It can also help business work their way up strengthening their marketing and sales strategies and become extremely responsive to customer requirements and grievances. This in turn helps businesses deliver more value to customer and win over…
  • Mobile App Development for Real Estate – These Features will help you to Pick the Best!

    Chirag Shivalker
    13 Feb 2015 | 7:51 am
    With the development and progress in the field of mobile apps; came a fresh air of innovation and efficiency! There are several industries which have immensely benefited with mobile applications – Let’s take realty sector for that matter – With expansion of this industry, the buyers and sellers need a robust support system that makes ‘house-hunting’ much easier, streamlined, and on top of if extremely swift. There are numerous mobile apps for real estate area, which are easily (for free) available on various platforms. This huge availability has actually made it difficult to pick up…
  • add this feed to my.Alltop

    Dataconomy

  • Scale Up is the New Scale Out

    Don Marti
    1 Apr 2015 | 3:01 am
    Scale up or scale out?  As we develop better tools and strategies for treating the whole data center- real or virtual- as a “server,” the answer seems obvious: it’s all about scaling out.  But that’s the big picture. While we’re scaling up, to more and more boxes, inside the box the server is becoming a miniature data center.  And that change is bringing an esoteric set of programming challenges to more and more data store developers. It’s not a question of “scale up” or “scale out” any more. Like most either/or questions in IT, the answer is: neither, but also both.
  • University of Rochester Brings Together Industry Veterans to Drive its Institute for Data Science

    Eileen McNulty
    31 Mar 2015 | 11:10 am
    To combat the impending dearth of skilled data scientists and analysts the University of Rochester, New York has set up the Institute for Data Science (IDS). The New York State recently provided support to create a new Rochester Center of Excellence in Data Science (CoE) at the University which, will cooperate with the IDS to leverage basic research, training and technology development in this field of Big Data to drive regional economic development. To supervise the workings of the IDS an External Advisory Committee for the University of Rochester’s Institute for Data Science convened…
  • 5 Painful Prediction Pitfalls

    Lars Trieloff
    30 Mar 2015 | 7:42 am
    Through my work with customers and data scientists building predictive applications based on the Blue Yonder Platform and integrating our standard products, such as Forward Demand, into customer workflows, I’ve encountered a few common prediction pitfalls. While these might not ruin the scientific validity of the model, they may affect the practicality of- and the applicability to- the business case. Predictive applications require applied data science and cannot live outside of their application domain. Watching out for these common prediction pitfalls will help you deliver predictive…
  • Facebook Diving Deeper into AI With Text & Video Recognition

    Eileen McNulty
    30 Mar 2015 | 2:52 am
    The second day at F8, Facebook’s annual developer conference, saw quite a few updates from the social networking giant. Facebook’s Chief Technology Officer, Mike Schroepfer, addressed their “long-term technology investments” in Connectivity Lab, Facebook AI Research and Oculus. Speaking about Facebook’s AI endeavour, Schroepfer said demonstrated how they have progressed so far. Working with researchers in the field Facebook is tapping a relatively new advancement in technology called Memory Networks “which enables a machine to perform relatively sophisticated question…
  • 10 Data Science Stories You Shouldn’t Miss This Week

    Eileen McNulty
    27 Mar 2015 | 8:43 am
    TOP DATACONOMY ARTICLES 14 Best Python Pandas Features “Pandas is the most widely used tool for data munging. It contains high-level data structures and manipulation tools designed to make data analysis fast and easy. Apart from serving as a quick reference, I hope this post will help you to quickly start extracting value from Pandas. So lets get started!”   MapR’s 4 Takeaway Lessons from the Hadoop Revolution “To get value out of today’s big and fast data, organizations must evolve beyond traditional analytic cycles that are heavy with data transformation and…
  • add this feed to my.Alltop

    Geeks On Site

  • What Should You Do When Your Computer Locks Up?

    admin
    31 Mar 2015 | 2:36 pm
    Nothing turns the screws on a tight deadline like the stomach-clenching realization that your computer has locked up. Many experienced computer users use to cry (or laugh?) when encountering the Blue Screen of Death. Fortunately, PC manufacturers have moved past those days. However, a variety of issues still lock up your PC.  Let’s look at some of the causes and solutions for frozen PCs. Viruses and Malware Computer virus infection is a common cause of computer lock-ups. When a virus gets into your computer, it first usually causes slowness of program loads, then computer lock-ups and even…
  • Protect Your Business from Hackers and Cyber Attack

    admin
    24 Mar 2015 | 1:30 pm
    In recent years, hackers have found ways to penetrate networks from the US government to Sony Corporation, and in the process, make network security chiefs jobs a lot harder. Whether the hack comes from a competitive threat, or a malicious prank, big businesses always have to be on the alert for network impropriety. Do small businesses have to watch for the same issues? Yes, they do. The National Small Business Association has found that 44% of its members have at some time suffered some sort of hack or cyber attack against its systems, its employees or its internal records. These attacks…
  • Business Account Manager: Nick Impellizeri

    admin
    17 Mar 2015 | 1:15 pm
    The post Business Account Manager: Nick Impellizeri appeared first on Geeks On Site.
  • Business Account Manager: Sebastian Lopez

    admin
    17 Mar 2015 | 1:12 pm
    The post Business Account Manager: Sebastian Lopez appeared first on Geeks On Site.
  • Business Account Manager: Kenji Gushiken

    admin
    17 Mar 2015 | 1:06 pm
    The post Business Account Manager: Kenji Gushiken appeared first on Geeks On Site.
 
  • add this feed to my.Alltop

    Xperts InfoSoft Pvt. Ltd.

  • 28 Mar 2015 | 6:58 am

    seoxperts
    28 Mar 2015 | 6:58 am
  • 23 Mar 2015 | 9:57 pm

    seoxperts
    23 Mar 2015 | 9:57 pm
  • 20 Mar 2015 | 6:30 am

    seoxperts
    20 Mar 2015 | 6:30 am
  • Software Tester

    seoxperts
    20 Mar 2015 | 6:24 am
    Our Openings Software Engineer (iOS) Content Writer Software Tester Quick Detail Software Tester for Applications on Android, IOS and Windows Job Description Role Responsibilities: Understanding product requirements, architecture, design. Writing test plans and designing test cases. Black box and white box testing. Testing mobile applications on Android, iOS and windows platforms and also web applications by executing test cases. Defect life cycle management. Interface with Product Manager and developers to make sure highest quality products are delivered. Candidate Must Have: 1-2 years of…
  • Tester

    seoxperts
    20 Mar 2015 | 6:24 am
  • add this feed to my.Alltop

    IAO IT Solutions

  • Brocade Foundry Networks FastIron 400 FI400 w/ 2x Jetcore J-F2404GMR4 2x 550w Power Supplies

    24 Mar 2015 | 12:44 am
    Vendor: Foundry Networks Type: Network Switches Price: 250.00 1x Off Lease Good Working Condition Brocade Foundry Networks FastIron 400 FI400 w/ 2x J-F2404GMR4 2x 550w Power Supplies The FastIron 400, 800 and 1500 systems are the first in the industry to provide Enterprise customers with a complete end-to-end LAN solution – from the wiring closet to the LAN backbone – based on a single product family. The new JetCore(TM) enabled FastIron systems simplify sparing, network operations and administration for dramatic savings in Total Cost of Ownership (TCO). Based on Foundry’s…
  • IAO IT Solutions Inventory for Liquidation

    23 Mar 2015 | 6:31 am
    Vendor: IAO IT Solutions Type: Downloads Price: 0.00 IAO IT Solutions is suspending reseller operations & liquidating all IT equipment inventory to focus on information security and managed services opportunities. All offers welcome by line item, package, or take all. Spreadsheet attached below for review.  https://delivery.shopifyapps.com/-/d147de66de8dd639/a8787faa0479b52e All remaining equipment will be incorporated into our IAO IT Solutions Gear Giveaway of Gratitude. Looking for creative ideas on how cost free technology equipment can be used to help those in need @IAOLLC IAO IT…
  • Kodak Easyshare Sport C123 12MP Waterproof Digital Camera

    22 Mar 2015 | 4:54 am
    Vendor: Kodak Type: Photography Price: 100.00 Excellent Condition Kodak Easyshare Sport C123 12MP Waterproof Digital Camera
  • Wholesale Lot: 6x Cisco 2811 Routers Advanced IP Services IOS 256MB/64MB Flash & Mounts

    21 Mar 2015 | 6:40 pm
    Vendor: Cisco Type: Routers Price: 300.00 Wholesale Lot 6x Refurbished Cisco 2800 Series 2811 Integrated Services Router 256MB/64MB MEM-NPE-G1-FLD64 VPN Advanced IP Services IOS and Rack Mounts  Routers were pulled from production network in working condition reset to factory defaults and verified fully operational *Wholesale Pricing Does NOT include shipping. These can be delivered locally or picked up at store. The Cisco 2800 Series provides significant additional value compared to prior generations of Cisco routers at similar price points by offering up to a fivefold performance…
  • Fort Gordon Information Assurance Training Center Security+ Training Resources

    17 Mar 2015 | 12:29 am
    Vendor: Comptia Security+ Type: Downloads Price: 0.00 Fort Gordon Information Assurance Training Center Security+ Training Resources A collection of CompTIA Security+ training references and documents provided during an 80 hour CISSP instructor led boot camp provided by Fort Gordon Information Assurance Training Center https://delivery.shopifyapps.com/-/5898e46aeda5dad3/6b77565b31b97e19
  • add this feed to my.Alltop

    Potknox Blog

  • HR Trends 2015: What do the experts predict? (5)

    pottu.venugopal@metanest.com
    30 Mar 2015 | 4:45 am
    The fifth interview in our  HR Trends Series was with Mrinal Krant, Practice Partner at HireAtEaseConsulting India Pvt.Ltd,  a leading provider of Human Resources Consulting, Leadership Hiring, Recruitment Consulting & Talent Advisory solutions to emerging sectors in India. With close to 12 years of experience, Mrinal had a number of very helpful and realistic insights, and a tonne of wisdom to share. He tells us the changes and patterns he’s observed over the  years and what he expects will happen in the future. How long have you been working in the field of HR? Close to 12…
  • HR Trends 2015: What do the experts predict? (4)

    pottu.venugopal@metanest.com
    18 Mar 2015 | 1:47 am
    If you’re a recruiter and you aren’t an ardent follower of The Savage Truth, you’re not a very good one. Jokes aside though (we’re serious), Greg Savage, Recruitment advisor, coach, speaker and investor gave us a few pearls of wisdom- on a flight to New Zealand, no less, about what he expects from the world of HR and his opinions on various facets of it and we promise you, it’s just as good as anything else he comes up with. Now, for anybody who follows his him on Twitter knows he has brilliant insights, ground breaking epiphanies and a lot of knowledge to…
  • How do Candidates feel about Video Interviewing?

    pottu.venugopal@metanest.com
    11 Mar 2015 | 4:30 am
    According to a report released by Office Team, more than six in 10 (63 percent) of HR managers interviewed said their company often conducts employment interviews via video. This is up from just 14 percent one year ago. Unfortunately, very much like Recruiter Texting, this is a trend that has picked up so much pace so fast, that many applicants haven’t had a chance to warm up to it. For hiring managers and recruiters, however, video interviewing is an absolute blessing. Given advancements in technology, they can now view applicants’ appearance and body language, record interviews and…
  • HR Trends 2015: What do the experts predict? (3)

    pottu.venugopal@metanest.com
    9 Mar 2015 | 12:46 am
    The third interview in our HR Trends Series was with Rishu Raheja, Deputy Manager (Talent Acquisition) at Bennett Coleman &  Co. Ltd. (Times Group). Having worked in large organisation like Godrej and now the Times Group, Rishu knows the responsibility a job in HR entails. You are, after all, dealing with the single most important resource of them all- people. In her short and crisp interview with us, she talks about the kinds of technologies that have already penetrated the HR sphere, the changes she wishes to see hereon in, and also gives job seekers and employers a bit of advice…
  • 10 Classic ‘Make It Happen’ Quotes by Women who Made it Happen

    pottu.venugopal@metanest.com
    7 Mar 2015 | 12:29 pm
    It’s Women’s Day 2015. More than any other day in the year, today is Of the Women, By the Women and For the Women. The 10 quotes are exactly what you need if you’re looking for inspiration to get out of a rut, or start something from scratch. The women who spoke  these words came from diverse backgrounds, cultures and nationalities, but had that one beautiful thing in common- being a woman. Read the ten quotes given below, and we guarantee you’ll want to take your idea to the next level by the end of it. For when you start to wonder… but what will they think?
 
  • add this feed to my.Alltop

    Saxons Blog

  • 5 Inspiring Startup Business Stories

    Angus Gill
    30 Mar 2015 | 4:04 pm
    According to the Treasury’s analysis of Australian Small Business statistics, over half a million Australians have started or are starting an entrepreneurial business at any one time. Out of these start-ups, about a third fail, another third are still in the unsure stages, and a third are successful. We took a look at 5 startups that have made it through the statistics. Let their stories inspire and motivate you when times are tough. Image source: Atlassian Press Resources Atlassian – from rags to riches. Mike Cannon-Brookes, Doug Burgum and Scott Farquhar are the leaders of the…
  • How The NBN Is Going To Affect Small Businesses

    Phil Bickerton
    29 Mar 2015 | 4:07 pm
    As the National Broadband Network starts operating in Australia, small business owners may be interested to find out more about what this service is, how it may affect them and how they can get started. Image source: NBN Co Media Centre What is the NBN? In April 2009, the Australian government announced plans to create an organisation that would build and manage the new superfast National Broadband Network. The plan included a budget of $43 billion that would cover 93 per cent of the country’s businesses, homes and schools with high-speed Internet of up to 100 megabits per second. This…
  • Why Employee Feedback Is Absolutely Essential

    Phil Bickerton
    25 Mar 2015 | 4:00 pm
    Your business is only as strong as the employees you hire. Yet in the frenzy of running a company and making money, it is easy to overlook your workers. After the initial induction and training process, you might be guilty of expecting them to get on with it, leaving them to their day‐to‐day tasks. This can be a big mistake, as your business’s viability will rely heavily on your employees’ insights and experiences. Image: https://www.flickr.com/photos/juditk/ – CC BY-ND 2.0 Forgetting to ask? Even if you are more pro‐active when it comes to your team, how often do you ask them…
  • 5 Ways To Boost Morale (Without Breaking The Bank)

    Rhiannon Walter
    23 Mar 2015 | 4:00 pm
    Have you ever pulled open your office door and heard muttered words of discontent from your staff? Or are you in the enviable position of having happy staff that are more productive, and hence help increase your turnover? Chances are that at some point, your staff will suffer from low morale, particularly if you do not put steps in place to counteract the likelihood of it happening. The problem is, many companies wrongly feel that implementing changes to boost staff morale is costly in both terms of money and time. Fortunately, this is not the case. With a little thought and planning, you can…
  • Australian SMEs Get A Leg Up From Google

    Phil Bickerton
    22 Mar 2015 | 2:00 pm
    The first event in a series of roadshows run in a joint partnership between the Australian Chamber of Commerce and Industry (ACCI) and Google has gone down without a hitch in Frankston, Victoria. Held on March 11 at the Frankston Arts Centre, the two-hour event was designed by the two companies in an attempt to boost the Internet acumen of SMEs in Australia. SMEs, companies generally comprised of fewer than 200 employees, account for approximately 69 per cent of Australia’s workforce, according to a 2014 report from the Australian Communications and Media Authority. The report also…
  • add this feed to my.Alltop

    Complete IT Professional

  • Oracle TRUNC Function Explained with Examples

    Ben
    26 Mar 2015 | 4:00 am
    The TRUNC function is one of the most common and versatile functions in Oracle. Let’s take a look at how it’s used and some examples.Purpose of the Oracle TRUNC FunctionThe purpose of the Oracle TRUNC function is to truncate either a number or a date value.The TRUNC function works on two different data types – number or date. This means you can provide it with either of these two data types, and the TRUNC function will perform slightly differently and give you a result for that data type.If you supply it a date data type, then it will return the portion of that value as…
  • What Is The System Analyst Job Description?

    Ben
    23 Mar 2015 | 4:00 am
    Have you heard of the “System Analyst” job title? Perhaps you are a System Analyst and want to find out what the actual description is. Learn what the system analyst job description is in this article.System Analyst Job DescriptionThe job description of a system analyst is:A system analyst looks at existing IT systems to analyse, design, and implement new IT solutions, or modify existing IT solutions.That’s the short answer. If you’ve been around IT for any length of time, you might have seen people or worked with people who fit this description. They also might seem…
  • Oracle CONCAT Function with Examples

    Ben
    19 Mar 2015 | 4:00 am
    The Oracle CONCAT function is not a very widely used function, but still helpful. Learn more about the CONCAT function in this article.Purpose of the Oracle CONCAT FunctionThe Oracle CONCAT function allows you to join, or concatenate, two strings together. It’s part of standard string manipulation in many programming languages.For example:string1 = “Yes ”string2 = “Please”To concatenate these strings means to join them together.string3 = “Yes Please” SyntaxThe syntax of the Oracle CONCAT function is:CONCAT( string1, string2 )The string that is…
  • Announcing “Software Developer Academy”

    Ben
    19 Mar 2015 | 2:45 am
    I’ve just made my new online training platform available for the public. Find out more about it in this article.So, after months of planning and setting up, I’ve finished setting up Software Developer Academy. It’s available at SoftwareDeveloperAcademy.com.Is this the first you’ve heard about it? If so, read on. If you’re subscribed to my newsletter, you would have been given early access, but this article is still helpful for you. What Is Software Developer Academy?Software Developer Academy is a new online training platform, or website, developed by…
  • Ruby on Rails vs PHP – A Comparison

    Ben
    16 Mar 2015 | 4:00 am
    Ruby on Rails and PHP are two very popular ways to create web applications. But how do you choose which one you want to use? Ruby on Rails or PHP? Let’s look at the differences in this article.What are Ruby on Rails and PHP?If you’ve spent any time around developers in the last few years, you would have heard of Ruby on Rails. Ruby on Rails is actually a combination of two technologies – Ruby, which is the programming language, and Rails, which is a framework built on top of the Ruby language.It’s quite a popular way to build websites and web applications these…
 
  • add this feed to my.Alltop

    Tutorial4u

  • Hands-on with Microsoft’s New Spartan Web Browser

    Verma
    1 Apr 2015 | 5:00 am
    Microsoft has put Internet Explorer on an ice floe and pushed it out to sea to die. When Windows 10 comes out this summer, it will have a new, much more modern Web browser, code-named, for now, Project Spartan. David Pogue goes hands-on. Source:: Tech news        The post Hands-on with Microsoft’s New Spartan Web Browser appeared first on Tutorial4u.
  • 10 Greatest Internet April Fools Day Jokes of All Time

    Verma
    31 Mar 2015 | 5:38 pm
    For as long as most of us can recall, April 1 has been the unofficial annual holiday of the Internet. Over the years we’ve seen a fair number of extremely funny, nerdy pranks. Here are the best. Source:: Tech news        The post 10 Greatest Internet April Fools Day Jokes of All Time appeared first on Tutorial4u.
  • The Grand Tour: The New Yahoo App

    Verma
    31 Mar 2015 | 1:11 pm
    When I joined Yahoo, my overlords and I agreed that I would not longer review one company’s products: Yahoo’s. I can’t review new Yahoo apps or services, because, of course, I’m paid by Yahoo, and that wouldn’t be veryobjective, now would it? There are lots of Yahoo apps, but this one is the flagship. In this app, you’ll find Yahoo’s most popular stuff, all in one place: Today’s weather (from Yahoo Weather) and top news (from Yahoo News Digest) All the articles you’d find on the Yahoo home page All of Yahoo’s digital…
  • Meet Plays.tv, the Self-Styled Instagram for Gamers

    Verma
    31 Mar 2015 | 12:17 pm
    The new service aims to give PC gamers an easy way to record gameplay video and a place to share that content. Source:: Tech news        The post Meet Plays.tv, the Self-Styled Instagram for Gamers appeared first on Tutorial4u.
  • Contract Job posts in REIL April-2015

    Verma
    31 Mar 2015 | 11:43 am
    By noreply@blogger.com (Sarkari Naukri) Rajasthan Electronics & Instruments Limited (REIL)(A Mini Ratna PSU) Published by http://www.SarkariNaukriBlog.com2, Kanakpura Industrial Area, Jaipur – 302012 Applications are invited for the following posts of on contract basis in RIEL : Manager (HR) – Maximum age 40 years Security Officer – Maximum age 55 years Engineer – Maximum age 32 years Executive – Maximum age 32 years Security Supervisor – Maximum age 55 years Technical Assistant – Maximum age 35 years Technician – Maximum age 37 years How to Apply : Eligible candidates…
  • add this feed to my.Alltop

    Rain Partners

  • Prioritize Your Project Timeline by Using Two Simple Lists

    Rain Partners
    26 Mar 2015 | 11:35 am
    Categories: Engage Stakeholders and Manage ExpectationsYour stakeholder wants the system perfect on day 1. He wants full critical functionality, along with lots of bells and whistles on top. The result: you're forced to schedule your project timeline with unrealistic deadlines and shortened development periods. Thankfully, it doesn’t have to be this way. Create a Manageable Project Timeline by Focusing Expectations on…(Read more...)
  • Goal Setting for Your Job: Use This Tool to Prioritize Surprise Requests

    Rain Partners
    23 Mar 2015 | 9:11 am
    Categories: Engage Stakeholders and Manage ExpectationsYou’re making excellent progress on the priorities you and your business stakeholder established a few months ago. You’re not done yet, but you feel confident you will complete the assignment on time. That is, until your business stakeholder arrives unexpectedly and shares a new set of assignments he wants you to handle personally. What do…(Read more...)
  • How to Create a Calm, Ordered and Process-Driven IT Organization

    Rain Partners
    13 Mar 2015 | 10:16 am
    Categories: Engage Stakeholders and Manage ExpectationsCalm. Ordered. Process-driven. Three qualities that define an ideal IT environment. And yet, most IT environments are tense, chaotic, and operate within a swirl of ad-hoc solutions to the day’s burning problems. What creates this gap between the controlled IT environment we all want to operate within, and the unmanageable environment most IT departments actually work…(Read more...)
  • How to Create an Overworked, Underpaid—But Fully Engaged—IT Workforce (Pt 3: Reward Your People When Money’s Tight)

    Rain Partners
    13 Mar 2015 | 8:19 am
    Categories: Develop Your IT Leadership TeamTwo weeks ago, we confronted an uncomfortable professional reality: as an IT leader, at least once in your career you will face lean times—stretches when IT’s resources are substantially reduced and everyone feels the pinch. During these lean times, three major problems crop up: A reactive desire to just accept the lean times and mechanically…(
  • How to Create an Overworked, Underpaid—But Fully Engaged—IT Workforce (Pt 2: How to Make “Boring But Necessary Work” Engaging)

    Rain Partners
    6 Mar 2015 | 2:44 pm
    Categories: Develop Your IT Leadership TeamLast week, we confronted an uncomfortable professional reality: As an IT leader, at least once in your career you will face lean times— stretches when IT’s resources are substantially reduced and everyone feels the pinch. During these times, three major problems crop up: A reactive desire to just accept the lean times and mechanically grind…(Read more...)
  • add this feed to my.Alltop

    iDojo

  • The best alternative for javascript alert box

    iDojo
    8 Mar 2015 | 5:13 am
    The best alternative for javascript alerts Lets compare the standard browser alert box with javascript and sweetAlert to see which one does a better job at presenting it. Browser Default Alert Show Error Message alert("Oops... Something went wrong!"); SweetAlert Show Error Message sweetAlert("Oops...", "Something went wrong!", "error"); Pretty cool huh? SweetAlert automatically centers itself on the page and looks great no matter if you’re using a desktop computer, mobile or tablet. It’s even highly customizeable, as you can see below!. Download and Usage Option 1: Put these two…
  • No More Updates for Chrome on Android 4.0

    iDojo
    7 Mar 2015 | 6:56 am
    No more Updates for Chrome on android 4.0 Ice Cream Sandwich Right now Android 4.0 (Ice Cream Sandwich) is almost four years old. and today google announced that it will freeze any future updates for chrome on ICS running devices. In today’s announcement, Google said that it’s released twenty-four versions of Chrome for Android 4.0. The last version of Chrome to land on ICS will be Chrome 42. Ice Cream Sandwich is on 5.9 percent of devices running Android, according to Google’s developer statistics, leaving a decent number of phone owners in the cold. Users still using Ice Cream…
  • A Pretty IRC Alternative – Pilgrim

    iDojo
    6 Mar 2015 | 5:53 am
    IRC (Internet Relay Chat) has been a favored platform for developers to chat and discuss their work, but it always had that dull look to it. Think of Pilgrim as a beautiful IRC alternative. Compared to the usual text editor like interface of IRC clients, Pilgrim* has a pleasing typography and color to it. as well as some nice sound effects and an indicator to let you know when someone is typing. The main draw is how easy it’s to set up a channel to instantly communicate with your peers, without the need of any signups or installations. Simply head to pilgrim.io, start a channel and…
  • Google can now automatically convert Flash ads to HTML5

    iDojo
    6 Mar 2015 | 5:49 am
    Today google began to automatically convert Adobe Flash ads to HTML5. As a result, it’s now even easier for advertisers to target users on the Google Display Network without a device or browser that supports Flash. Campaigns will automatically be switched over from Flash ads to HTML5 when uploaded through AdWords, AdWords Editor or some third party tools. Although not all ads can be converted, the change should still affect a large portion of new campaigns. You can test whether your ad was converted by checking for impressions on tablets and mobile devices. Google first suggested it would…
  • Open html link in a new tab

    iDojo
    6 Mar 2015 | 5:47 am
    How to open an html link (hyperlink) in a new tab? – it’s a basic question that all newbie web developers will end up having. lets see how we can achieve this. Difficulty level : too easy What is a hyperlink? Hyperlinks are clickable elements, text, or images which on click will open another document (html page, file, image etc.) The Syntax The <a> tag define links in html. like,<a href="http://www.idojo.co/">iVisit us!</a> The href attribute specifies the destination address (http://www.idojo.co/) The link text is the visible part (Visit us!). Clicking on the…
 
Log in