Search

IT News

Who Legally Owns Your Big Data?

Commingling internal and external data can produce problems if your contract isn't clear about who owns what -- and for how long....

31.05.2014

3 Ways to Manage Corporate Digitization

Single digital executive or digital islands? It's time to choose an approach that fits your corporate strategy, according to research by the MIT Center for Information Systems Research...

31.05.2014

More networking news,features and forums

...

30.05.2014

Google axes all Chrome extensions outside of Chrome Web Store

Google announced today that long-standing plans to unify the distribution of Chrome extensions for Windows users under its own Chrome Web Store have come to fruition, locking out extensions being distributed elsewhere on the web....

30.05.2014

How to Build a More Diverse IT Workforce

If you're looking for a way to more easily identify talent from underrepresented groups, Entelo Diversity offers a service that it claims leads to a more diverse tech team....

30.05.2014

Gartner: Amazon runs away with IaaS cloud Magic Quadrant; Microsoft catching up

Amazon Web Services, for another consecutive year, is running away with the IaaS cloud market, according to research firm Gartner, but unlike other years the competition - namely Microsoft, is giving the market leader a run for its money.  ...

30.05.2014

Symantec acquires NitroDesk for email security on Android

Symantec said Wednesday it closed a deal last week to acquire NitroDesk, which makes security and management applications for mobile devices....

30.05.2014

Apple to buy Beats for $3 billion

Apple confirmed its long-rumored acquisition of Beats Music and Beats Electronics, saying it will pay $3 billion for the companies....

30.05.2014

Iranian group created fake news organization as part of hacking campaign

A suspected Iranian hacker group seeded Facebook and LinkedIn with bogus profiles of attractive women and even created a fake online news organization to get digitally closer to more than 2,000 people whom it wanted to spy on....

30.05.2014

Core Infrastructure Initiative to delve into security of OpenSSL, OpenSSH, Network Time Protocol

The Linux Foundation today announced the first protocols that it wants to address as part of its open-source code testing and security review. Not surprisingly, OpenSSL, where the infamous Heartbleed bug was discovered, is among them....

30.05.2014

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker