Top Tech Stories

Syndicate content
Updated: 9 years 34 weeks ago

SDS still young, but very much on the rise

Thu, 08/21/2014 - 12:00

Anything "software-defined"-- networks, storage, data centers--is grabbing a lot of attention these days. Security is no exception. Software-defined security (SDS) is an emerging model in which information security is deployed, controlled and managed by software.

With SDS, security controls such as network segmentation, intrusion detection and access control are automated and monitored via software.

Categories: IT General

Five ways Docker is taking over the world

Wed, 08/20/2014 - 21:07

Credit: iStockphoto

Categories: IT General

Five ways Docker is taking over the world

Wed, 08/20/2014 - 21:07

Credit: iStockphoto

Categories: IT General

Fifth Surface Pro 3 patch in two months still doesn't address the big problems

Wed, 08/20/2014 - 16:40

Microsoft just rolled out another firmware update for its troubled Surface Pro 3 tablet, and if there's an official explanation for this latest blast, I haven't seen it.

Categories: IT General

Fifth Surface Pro 3 patch in two months still doesn't address the big problems

Wed, 08/20/2014 - 16:40

Microsoft just rolled out another firmware update for its troubled Surface Pro 3 tablet, and if there's an official explanation for this latest blast, I haven't seen it.

Categories: IT General

Review: VMware VSAN turns storage inside-out

Wed, 08/20/2014 - 12:00

Convergence of compute and storage is all the rage in the virtualization market these days.

Categories: IT General

In Microsoft's cloud quest, some will get left behind

Wed, 08/20/2014 - 12:00

Credit: iStockphoto

Categories: IT General

How to solve Java's security problem

Wed, 08/20/2014 - 12:00

Java applications remain a popular target for cyber criminals, as they are widely used to control access to critical data, despite Java's continuing struggles with security vulnerabilities. In this installment, John Matthew Holt, founder and chief technology officer at Dublin-based Waratek, lays out a new approach for securing Java applications. -- Paul Venezia

Categories: IT General

Ballmer exits Microsoft board -- stock market nods approval

Wed, 08/20/2014 - 12:00

Credit: Microsoft

Categories: IT General

Are you experienced? Not for this IT job

Wed, 08/20/2014 - 12:00

Credit: iStockphoto

Categories: IT General

Google's Docker tool taps Apache Mesos for cluster management

Wed, 08/20/2014 - 12:00

Google's Kubernetes project, an orchestration and management system for Docker, is gaining a lineup of collaborators and partners that's remi

Categories: IT General

Revealed! How to become a tech wunderkind in 1,286 easy steps

Tue, 08/19/2014 - 12:00

Credit: Otmar Winterleitner

Categories: IT General

Pay up: The free ride is over for corporate BYOD

Tue, 08/19/2014 - 12:00

Credit: TongRo

Categories: IT General

Fear the golden ticket attack!

Tue, 08/19/2014 - 12:00

Credit: Joseph Francis/Andrey Pokomeda

Categories: IT General

Python puts its print on multitouch apps with Kivy

Tue, 08/19/2014 - 12:00

Kivy, an open source library based on Python, brings native development of user interfaces and multitouch applications to Android, iOS, Linux, Windows, and Mac OS X.

Categories: IT General

Hadoop gets real

Tue, 08/19/2014 - 12:00

Technology professionals with strong skills in Apache Hadoop are among the hardest to find. In fact, demand for people with Hadoop expertise has skyrocketed 34% since last year, according to Wanted Analytics, a research firm specializing in the labor market.

Categories: IT General

Wyoming, a cloud leader? Take notes, America

Tue, 08/19/2014 - 12:00

The state of Wyoming plans to discontinue most of its data center operations and move its servers to colocation facilities. Outsourcing its two data centers is an interim step to eventually moving these IT systems to public cloud services. Where Wyoming goes, the rest of the states should follow.

Categories: IT General

Hackers steal data on 4.5 million U.S. hospital patients

Mon, 08/18/2014 - 22:59

A major U.S. hospital operator says hackers based in China broke into its computer systems and stole data on 4.5 million patients.

Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place.

Categories: IT General

Microsoft yanks botched Black Tuesday patches KB 2982791, KB 2970228, KB 2975719, and KB 2975331

Mon, 08/18/2014 - 13:25

The saga that started last Tuesday continues, with Microsoft finally acknowledging that some Windows 7 machines have

17 ways to hate Microsoft Outlook 2013 less

Mon, 08/18/2014 - 12:00
Few software products draw such universal -- and deserved -- scorn as Outlook 2013. Here's how to tame the beast Dek:  Few software products draw such universal -- and deserved -- scorn as Outlook 2013. Here's how to tame the beast External Source:  infoworld.com Redirect Unpublished Slideshow to:  http://www.infoworld.com/slideshow/161639
Categories: IT General

eXTReMe Tracker