Quantcast
Channel: patrick gray on TechRepublic
Browsing latest articles
Browse All 48 View Live

Employee sourcing tablet innovation

Employee sourcing tablet innovationarticle rootHe is trying to advertise his book NOT Vendor Neutral!Patrick Gray has a book to sell! Tablets and BYOD are inherently insecure and there is no way users...

View Article



Yahoo and the perils of going remote

In light of Yahoo's reversal on its employees working from home, Patrick Gray talks about why the decision is more complicated than people think.

View Article

How to test Firefox 23 change on unsecured content before it happens

Mozilla announced that the next version of its browser, Firefox 23, will automatically block unsecured content on encrypted web pages. You can check how that change will affect your own or other...

View Article

Three areas of concern for Big Data in the data center

Big Data is not just a tool for business analysis. it can also be a helpful tool to improve the data center.

View Article

How Android can beat Apple in the tablet space

Exact market share numbers for tablets are difficult to come by. Depending on whom you believe, Apple's iPad may own as much as 80% of the tablet market -- or it may be dipping below 50%, with Google's...

View Article


Does IT have a problem with women?

If we can shed some of the industry's juvenile past, while maintaining this merit-based culture, IT will attract all comers, regardless of gender.

View Article

New McAfee patent hints at a more walled-off online world

A McAfee patent hints at content filtering at the user level in order to block sites that offer pirated content.

View Article

What the decline in Apple's stock means for tablets

Does the decline in Apple's stock signify the beginning of the end on the tablet front, or will the company be able to bounce back?

View Article


Review Paper on Detection and Prevention Techniques of Gray-Hole Attack in Manet

MANET is a kind of wireless ad hoc network. It is a self-configuring network of mobile routers connected by wireless links with no access point. Every mobile device in a network is autonomous. The...

View Article


Do students who are issued tablets miss the benefits of experiential learning?

What is your opinion about tablet initiatives in schools for the sake of education? Are students missing out on the benefits of experiential learning?

View Article

Keeping your corporate social media accounts secure

Does your company have official social media accounts like Twitter or Facebook? How do you protect them from unauthorized access? Get a few tips here and take our poll on security measures.

View Article

DARPA's Plan X and the future of the U.S. cyber defense infrastructure

Plan X sounds like a summer sci-fi movie, but it's actually one of DARPA's latest projects, aimed at improving the nation's defense of critical infrastructure targets.

View Article

New Android malware should be wake-up call for security admins

Security firm Kaspersky reported on a new malware threat that it calls the most sophisticated it has seen in targeting Android phones.

View Article


On the Asymptotic Performance of Bit-Wise Decoders for Coded Modulation

Two decoder structures for coded modulation over the Gaussian and flat fading channels are studied: the maximum likelihood symbol-wise decoder, and the (suboptimal) bit-wise decoder based on the...

View Article

Lessons for any company considering a tablet deployment

Patrick Gray offers some lessons that were learned about tablet deployment during a shopping trip at a retail store.

View Article


Q and A with Patrick Ancipink, CA Technologies on new Cloud report

Here's a look at the recently published report Cloud Succeeds. Now what?

View Article

Everything you need to know about using TOR

TOR's anonymizing and encrypting features make it a very useful tool for privacy. Here's a quick look at the basics.

View Article


The NSA and Big Data

While your company may not be subjected to the global scrutiny befalling the NSA and U.S. intelligence gathering apparatus, the "Big Snooping" capabilities engendered by Big Data must be used in a...

View Article

Email encryption: Using PGP and S/MIME

For those worried about the security and privacy of email communications, encryption is one layer to add, but using encryption software isn't terribly user-friendly.

View Article
Browsing latest articles
Browse All 48 View Live




Latest Images