Apple Watch Gets Email, IT Support
Good Technology ported its enterprise email application to the Apple Watch so mobile professionals can manage their inboxes and IT can manage Apple's fledgling wearable.
Google Wants You To Be Healthy
An assortment of cloud-based data-collecting and data-analysis tools aimed at health practitioners, researchers, and individuals offers ideas for any enterprise looking to maximize cloud computing.
11 PCs Ideal For Windows 10 Upgrades
With Microsoft's big Windows 10 launch just over a month away, let's take a look at some recently released PCs that would be ripe for an OS upgrade.
Windows 2003 Server End Of Support: What IT Needs To Know
Many systems administrators will look at migrating from Windows Server 2003 as a daunting task. It should instead be seen as a chance to review your hardware, software, and deployment options. Here are seven things you need to know.
NBA CIO Focuses On Analytics, Data And Fans
InformationWeek Videos | 6/24/2015 The NBA is one of the most tech-savvy sports leagues. A lot of that has to do with CIO Michael Gliedman, who oversees the process of turning reams of data into a fan-friendly stats website.
Docker To Defang Root Privilege Access
Docker's upcoming 1.8 release will answer security concerns by separating a running container's root privilege from that of its owner to avoid the owner becoming a "Superuser."
NBA CIO Focuses On Analytics, Data And Fans
The NBA is one of the most tech-savvy sports leagues. A lot of that has to do with CIO Michael Gliedman, who oversees the process of turning reams of data into a fan-friendly stats website.
Can Data Teach Us Empathy?
Walking a mile in your customers' shoes is the first step toward designing great products. Can data help us get there?
iOS 9, Android M Place New Focus On Security, Privacy
Google and Apple have publicly challenged calls from law enforcement agencies to weaken encryption on consumer devices. In turn, iOS 9 and Android M will sport a string of new security and privacy features for users.
Supercomputers Unleash Big Data's Power
Here are six reasons why established companies, and even startups, are using supercomputing resources, and why your IT organization may want to consider such options to meet your big data and business analytics needs.
Amazon Echo Wants To Talk With You
With its invite-only beta phase behind it, Amazon Echo will be available for sale in the US next month with several new features, including connected-home options, Google Calendar, and Audible Audiobooks.
CFO Data Needs: How IT Stacks Up
If you think about how the data is going to be presented and used by the CFO's group, the technological decisions to ensure data accuracy and determine types of data you present actually become easier.
Amazon Applies Machine Learning To Improve Reviews
Amazon.com has for several years capitalized on machine learning for its recommendations that come with customer purchases on the retail site. Now, it's extending those efforts to product reviews and star ratings to enhance customer experiences.
IBM Aims To Ease Data Sharing For Police, Emergency Services
IBM's Safer Planet, a sub-unit of the company's Smarter Planet effort, is expanding its cloud-based offerings with the goal of making data sharing and analysis affordable and accessible to IT professionals in a wide range of public safety and emergency management agencies.
FCC: Subsidize Rural Broadband, Block Robocalls
The FCC voted 3-2 to extend and reform a program that would help low-income Americans gain access to the Web through subsidies. The commission is also allowing customers to block spam and robocalls.
600M Samsung Smartphones Vulnerable To Hacking
A report from a security firms finds that Samsung's smartphones are vulnerable to attacks thanks to replacement software in the SwiftKey keyboard. However, it's not really Samsung's fault.
8 Ways MDM Can Ease IT Pain
Mobile device management is more than a security tool. Here's how your IT organization can draw value from MDM.
OPM Breach Offers Tough Lessons For CIOs
While your enterprise may have a chief information security officer and a robust data governance department, CIOs and IT organizations are the ones on the front lines of protecting enterprise data. What lessons can we draw from the OPM breach?
|