OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
Nest Labs Opens Door to 3rd-Party Devs
October 2, 2015
Nest Labs on Thursday said it would open its communications platform to third-party developers for the first time, which will allow outside home device makers to set up products that communicate directly with Nest products. Nest announced an update to its Nest Weave communications protocol that will allow outside developers to link other home devices to its own.
Microsoft Pushes Deeper Into Linux, Containers, IoT
October 1, 2015
Microsoft announced a slew of corporate cloud solutions at Tuesday's AzureCon. "The value for IoT is in control, data collection and analysis, and Microsoft is apparently building a cloud service that can do all three, and wrapping it with enterprise-level security," said Rob Enderle, principal analyst at the Enderle Group. Microsoft also announced a new open Azure Container Service.
Black Hats Offer Million-Dollar iOS 9 Bug Bounty
September 30, 2015
Zerodium has posted a million-dollar bounty for juicy iOS 9 bugs or jailbreaks. Zerodium runs a market where exploits and vulnerabilities are bought and sold, according to Damballa. "While there is no insight into a specific buyer, we can assume if an exploit for iOS 9 is found, Zerodium will sell it for way more than $1 million," wrote Loucif Kharouni, senior threat researcher at Damballa.
BlackBerry Sees the Android Light
September 28, 2015
BlackBerry on Friday announced that it would introduce an Android smartphone later this year. The announcement came during the company's Q2 earnings call. The device will be known as the "Priv" and will be built around user privacy, said CEO John Chen. BlackBerry didn't offer any specifics about the Priv beyond the name -- nothing about pricing, U.S. carrier partners or any handset specs.
Malware Jumps Apple's Garden Wall
September 22, 2015
Developers who unknowingly used a malicious tool to code their programs uploaded hundreds of malware-infected apps to the iTunes App Store, China-based iOS developers reportedly discovered last week. Security researchers around the world have analyzed it. Called "XcodeGhost," the malware is hidden in an unauthorized version of a program Apple distributes to create iOS apps.
Apple Levels up with tvOS
September 10, 2015
The refreshed Apple TV, tvOS and the Siri Remote Apple presented during Wednesday's "Hey Siri" event may not have been game changers, but the people pushing Apple's renewed focus on gaming are. Television's future lies in apps, proclaimed Apple CEO Tim Cook as he drew the curtain on the Apple TV's new iOS 9-powered operating system: tvOS. That line drew a chuckle from owners of Fire TVs and Rokus.
Sauce Labs' Automated Mobile App Testing Gets Real
September 9, 2015
Sauce Labs on Tuesday announced the release of its automated mobile testing solution for real devices. The new option lets developers test mobile applications directly on the devices that will run them. About 80 percent of software and application testing is performed manually. Automated testing on real mobile devices brings enhanced speed, fidelity and cost-efficiency to the software development process.
US Agencies Getting the Hang of Doing More With Less
September 9, 2015
U.S. government agencies are gradually learning to deal with budget constraints in the management and procurement of IT. The emphasis on productivity comes from the Obama administration, the ripple effects of budget sequestration, and congressional pressure for efficiency. "Agencies continue to face budget constraints while trying to modernize IT systems," noted Deltek market analyst Angie Petty.
Linux Foundation Security Checklist: Have It Your Way
September 6, 2015
The Linux Foundation's recently published security checklist may draw more attention to best practices for protecting Linux workstations, even if IT pros do not embrace all of its recommendations. Konstantin Ryabitsev, the foundation's director of collaborative IT services, developed the list for the use of LF remote sysadmins, to harden their laptops against attacks.
White House Wants Feedback on IT Contract Security
September 2, 2015
Cybersecurity is a key component of all contracts between U.S. government agencies and information technology vendors. Yet cyberbreaches continue to occur -- some of them with alarming scope and depth. The White House is seeking input from private sector vendors and others on how to improve the cybersecurity elements involved in federal government purchases of IT equipment and services.
Dreamforce: Still the One
September 2, 2015
We watched as Salesforce emerged from the crowd in the dot-com era to become a massive company with a $7 billion run rate. We also changed perspectives several times on what to expect from Dreamforce. We used to be interested mostly in cool new technologies and business models, but as Salesforce has grown, it has acquired a following of financial analysts as well as industry analysts like me.
Shadow IT Feeds 'Man in the Cloud' Attacks
August 27, 2015
Shadow IT -- the use of unauthorized online services by company employees -- is a concern of cyberwarriors charged with defending business systems against network attacks. There's new evidence that those concerns are justified. A new attack vector on business systems leverages the synchronization features of services like Dropbox and Google Drive to perform malicious mischief.
At 24, Linux Has Come Out of the Basement
August 26, 2015
Happy Birthday, Linux Project -- this week you turned 24. The Linux OS has grown up everywhere. Its code and the open source model are found worldwide. People often use linux without knowing it -- when they search on Google, buy metro tickets or surf the Web. Linux travels worldwide on airplanes, and it's embedded in many of the smart devices that bring ultra convenience to our homes and cars.
Linux Foundation Wants to Pin a Badge on Secure Open Source Software
August 25, 2015
The Core Infrastructure Initiative last week announced a program that will offer badges to open software developers who follow best practice software development and security procedures. The CII project enables technology companies, industry stakeholders and software developers to collaborate on the identification and funding of critical open source projects in need of assistance.
Intel: Putting Innovation Back in the Hands of the Innovators
August 24, 2015
We are living in an amazing time, but many of us seem to take it for granted. We have private spaceships. Self-driving cars are on the road, even though we can't buy them yet, and there are plans for a 12-mile-high inflatable building. Granted, a number of us are convinced it will end up looking like a giant version of the inflatable fan blown stick man often seen outside of car dealerships.
Devs Get to Poke Around With Marshmallow
August 20, 2015
Google on Monday announced the official SDK for Android 6.0, aka "Marshmallow." It also opened Google Play for devs to publish apps that target the new API Level 23 in Marshmallow. Google further updated the Android Support Library to v23, giving devs an easier way to make new platform APIs, such as permissions and fingerprint support, backward compatible.
Fork Release Intensifies Bitcoin Community Bitterness
August 18, 2015
A full release of Bitcoin XT just became available, heaping fuel on the fire spreading throughout the community. One site went so far as to ban XT-related posts, resulting in allegations that a small cabal had taken control and was suppressing discussion and dissent. The cause of all the furor is a dispute over how to ensure that the Bitcoin system's capacity keeps up with its rapid growth.
Open Mainframe Project Pushes Linux's Limits
August 17, 2015
The Linux Foundation on Monday announced the formation of the Open Mainframe Project to advance the development of Linux on the mainframe among academia, government and corporate partners. The foundation announced the software consortium at the LinuxCon/CloudOpen/ContainerCon gathering in Seattle. The project will create a set of tools and resources to drive further collaboration and improvements.
Legislation Aims to Bring Product Warranties Into the Internet Age
August 17, 2015
The process of "checking the fine print" always has been an important aspect of consumer behavior. For product manufacturers, providing important transaction information to consumers also has been a challenging part of business operations. Take the fine print of warranty information, for example. In the world of e-commerce, how should sellers and buyers approach the warranty issue?
Autodesk's Stingray Gets Into Video Game Guts
August 4, 2015
Tired of serving as just a pretty face, Autodesk on Monday announced that it's putting its muscle into the business of making video games. The new Stingray engine, introduced at the Game Developers Conference, pulls together Autodesk's efforts in the games space. Stringray is a cross-platform engine that supports Xbox One, PlayStation 4, the Oculus Rift, Windows, Android and iOS.
Windows 10: Changing the Apple vs. Microsoft Dynamic
August 3, 2015
What I find most interesting about Windows 10 is that if Apple wanted to knock Microsoft off the desktop, then it -- not Microsoft -- should have released a product like this. When I say "like this," I mean one that could transform a smartphone into a PC. My reasoning is that Microsoft is relatively weak in smartphones, and Apple currently is kicking Google all over the market.
OpenDaylight Project Picks Up Steam
July 30, 2015
The OpenDaylight Project this week announced that AT&T, ClearPath Networks and Nokia Networks have joined, bringing its membership total to 359. OpenDaylight is a collaborative open source project hosted by the Linux Foundation. Its goal is twofold: accelerate the adoption of software-defined networking; and create a solid foundation for network functions virtualization.
Salesforce's Lightning Announcement
July 29, 2015
Spreadsheets suffered a body blow on Tuesday, when Salesforce announced new platform functionality. Soon all spreadsheets will be good for is financial analysis. This sounds funny, because the spreadsheet for several decades has been the unofficial IT prototyping tool. Actually, it was the end-users' prototyping tool -- the default thing they used to capture data.
Tech Giants Boost Open Source Container Collaboration
July 25, 2015
The Linux Foundation this week announced the Cloud Native Computing Foundation, a consortium dedicated to the development and adoption of common container technologies. CNCF aims to make it easier for businesses to deploy containerized cloud applications oriented to microservices. Open source container-packaged applications are easier to create, manage and deploy, said tech analyst Rob Enderle.

See More Articles in IT Section >>
Facebook Twitter LinkedIn Google+ RSS
Do you want to live in an Internet-connected home?
Yes -- I have some smart things, and I want more.
Yes -- I'm looking forward to all the conveniences.
Not sure -- I have security and privacy concerns.
No -- the technology isn't good enough yet.
No -- it's a ridiculous waste of money.