Welcome Guest | Sign In
LinuxInsider.com
Google Issues Clarion Call for Project Ara Devs
February 27, 2014
Google is ramping up its plans to bring the Project Ara modular smartphone to market by scheduling its first developer conference. The company will hold the conference on April 15-16 at the Computer History Museum in Mountain View, Calif. A limited number of developers will be able to attend the conference in person, but anyone can participate online through a live stream and interactive Q&A.
FTC Explores Scope of Federal IoT Regulation
February 25, 2014
The explosion of the Internet of Things, or IoT, promises great opportunities for improving quality of life -- but also for creating both seen and unforeseen dangers. The IoT generally refers to a network of physical objects that contain embedded technology to sense, communicate and interact with their internal states or their external environment, according to Gartner.
Google's Project Tango Struts Into the Spotlight
February 21, 2014
Google is making an increased push into the 3D imaging sphere with the announcement of its Project Tango technology. The project is aimed at helping mobile devices fully map a 3D space to give them the same type of understanding of space and motion that humans have, through a blend of robotics and computer vision tools. The prototype smartphone Google unveiled has myriad sensors.
Easing DevOps Snafus in the Cloud Era
February 21, 2014
As developers are pressured to produce mobile and distributed cloud apps ever faster and with more network unknowns, the older methods of software quality control can lack sufficient predictability. And as Agile development means faster iterations and a constant stream of updates, newer means of automated testing of the apps in near-production realism prove increasingly valuable.
Google May Let 34 More Cities Munch on Fiber
February 20, 2014
Google has revealed plans to expand its Google Fiber Internet service to as many as 34 new cities. Google Fiber offers connection speeds of up to 1,000 Mbps -- around 100 times faster than the average U.S. speeds of 9.8 Mb/sec, according to Akamai -- by providing service through fiber-optic cables instead of copper wiring. Google's service also delivers high-definition television.
Dear Adobe: Make Software for Linux Too
February 18, 2014
What if commercial software developers for popular Windows products sold Linux versions to a waiting market of open source users? Think in terms of paying a subscription fee to use a Linux version of Adobe's Photoshop image manipulation software, for starters. Is porting commercial products like Photoshop as a paid product for Linux a viable idea?
Feds Struggle to Make Electronic Discovery Pay Off
February 12, 2014
Federal agencies spend considerable portions of their budgets on their legal offices. For example, the DoJ awarded a $1.1 billion multiyear contract in 2013 for a wide range of information technologies and legal support services. Yet legal staffs across the federal government are struggling to productively use many of these IT tools, especially e-discovery and electronically stored information.
Feds' Shift to Mobile Creates Security Cracks
February 05, 2014
Federal employees quickly have become strong adherents of mobile devices. In a recent survey, 90 percent of government employees said they used at least one mobile device -- laptop, smartphone or tablet -- for work purposes. However, the enthusiasm by federal workers for the use of mobile devices has not been matched by appropriate concerns for security.
Target Fiasco Shines Light on Supply Chain Attacks
February 03, 2014
The holiday data breach at Target was opened up with stolen credentials from a vendor in the company's supply chain, according to reports that surfaced last week. That kind of attack is getting more and more common these days. "About 80 percent of data breaches originate in the supply chain," said Torsten George, vice president of marketing for Agiliance.
IT Weaknesses Paved the Way for Target Hackers
January 30, 2014
The Target data breach exposed more than 100 million customers, riled up U.S. intelligence agencies, sparked a Justice Department investigation, involved the U.S. Department of Homeland Security and the FBI, triggered congressional hearings, and led several banks to re-issue their credit cards. The hacker has variously been identified as a 17-year-old Russian or one or more other cybercriminals.
Healthcare Fiasco Energizes Federal IT Reform Efforts
January 29, 2014
The widespread problems in implementing the Affordable Care Act have provided some momentum to the efforts by the Obama administration and Congress to ratchet up reforms in the management and procurement of IT. President Obama conceded the need to put more emphasis on such reforms when he spoke about the troubled health exchange website and other IT problems with the Healthcare.gov rollout.
Internet of Everything Means Trillions for Public Sector
January 22, 2014
It doesn't make too much sense to send a sanitation truck around a predetermined route to empty street-side trash bins if half the bins are empty. It's a waste of employee time and truck fuel to stop unnecessarily at thousands of bins. If the bins could speak for themselves and notify the public works department when they're nearly full, then a more efficient pickup schedule could be implemented.
Can Android Challenge Embedded Linux?
January 21, 2014
Is the Android OS morphing into a new form of embedded Linux? Android is a Linux OS derivative perched to make inroads beyond its growing user base in smartphones and tablets. Some auto makers are considering the potential for Android-connected communications systems in their vehicles. The Android OS is already available as an all-in-one desktop computer powered by System on a Chip circuitry.
Google Axes Adware-Pushing Chrome Extensions
January 20, 2014
Following reports of adware being distributed through extensions for Google's Web browser Chrome, the search giant has removed two applets from it its online store. Pulled from the Chrome Web Store were "Add to Feedly" and "Tweet This Page." Both extensions were mentioned in a Friday report about adware vendors buying popular Chrome extensions and transforming them into advertising hoses.
US Supreme Court to Examine Scope of Software Protection
January 17, 2014
Software developers have long been able to protect their innovations by virtue of a favorable provision of U.S. patent law that gives them almost monopoly power to maximize financial returns. The law enables developers to take action against any other party that comes close to duplicating or imitating their software programs through court litigation on charges of infringement.
Huge Growth in Store for In-App Mobile Messaging
January 16, 2014
In-app mobile advertising is expected to jump significantly between now and 2018, according to new figures from Juniper Research. Ad spend in this category will reach $16.9 billion by 2018, up from $3.5 billion last year, the consulting group found. Smartphones currently account for approximately 70 percent of in-app ad spend, Juniper said, but that ratio is expected to change.
What's Up With Tizen?
January 15, 2014
Consumers might soon have access to cheaper, more talented smartphones that could challenge the market dominance of Android and iOS. At least that is the promise from the Tizen Association. The growing group of phone makers and application developers recently launched a partner program with 36 companies from all segments of the mobile and connected device ecosystems.
Accenture Tapped to Doctor HealthCare.gov
January 13, 2014
The raft of problems connected to the launch of HealthCare.gov appears to have sunk the fortunes of the private contractor paid for running the site. The Centers for Medicare and Medicaid Services, charged with overseeing the health insurance marketplace, has awarded Accenture Federal Services a one-year contract for $45 million to implement technical improvements to the site.
Microsoft's Next Windows May Be Dressed to the 9
January 13, 2014
Microsoft reportedly will discuss its vision for the future of Windows at its Build developer conference, to be held in San Francisco April 2-4. The company also will talk about the next version of its operating system, code-named "Threshold," which will be officially named "Windows 9" and will debut in April 2015. Windows 8 generally has been panned, and sales reportedly have been poor.
Intrusion Prevention: Keeping the Bad Guys Out
January 13, 2014
By improving the security and availability of services, IT leaders can deliver better experiences and payoffs for businesses and end users alike. In this podcast, we're joined by Jim O'Shea, Network Security Architect for HP Cyber Security Strategy and Infrastructure Engagement. We'll explore the ins and outs of improving enterprise intrusion prevention systems.

See More Articles in IT Section >>
Facebook Twitter LinkedIn Google+ RSS