Employee sourcing tablet innovation
Employee sourcing tablet innovationarticle rootHe is trying to advertise his book NOT Vendor Neutral!Patrick Gray has a book to sell! Tablets and BYOD are inherently insecure and there is no way users...
View ArticleYahoo and the perils of going remote
In light of Yahoo's reversal on its employees working from home, Patrick Gray talks about why the decision is more complicated than people think.
View ArticleHow to test Firefox 23 change on unsecured content before it happens
Mozilla announced that the next version of its browser, Firefox 23, will automatically block unsecured content on encrypted web pages. You can check how that change will affect your own or other...
View ArticleThree areas of concern for Big Data in the data center
Big Data is not just a tool for business analysis. it can also be a helpful tool to improve the data center.
View ArticleHow Android can beat Apple in the tablet space
Exact market share numbers for tablets are difficult to come by. Depending on whom you believe, Apple's iPad may own as much as 80% of the tablet market -- or it may be dipping below 50%, with Google's...
View ArticleDoes IT have a problem with women?
If we can shed some of the industry's juvenile past, while maintaining this merit-based culture, IT will attract all comers, regardless of gender.
View ArticleNew McAfee patent hints at a more walled-off online world
A McAfee patent hints at content filtering at the user level in order to block sites that offer pirated content.
View ArticleWhat the decline in Apple's stock means for tablets
Does the decline in Apple's stock signify the beginning of the end on the tablet front, or will the company be able to bounce back?
View ArticleReview Paper on Detection and Prevention Techniques of Gray-Hole Attack in Manet
MANET is a kind of wireless ad hoc network. It is a self-configuring network of mobile routers connected by wireless links with no access point. Every mobile device in a network is autonomous. The...
View ArticleDo students who are issued tablets miss the benefits of experiential learning?
What is your opinion about tablet initiatives in schools for the sake of education? Are students missing out on the benefits of experiential learning?
View ArticleKeeping your corporate social media accounts secure
Does your company have official social media accounts like Twitter or Facebook? How do you protect them from unauthorized access? Get a few tips here and take our poll on security measures.
View ArticleDARPA's Plan X and the future of the U.S. cyber defense infrastructure
Plan X sounds like a summer sci-fi movie, but it's actually one of DARPA's latest projects, aimed at improving the nation's defense of critical infrastructure targets.
View ArticleNew Android malware should be wake-up call for security admins
Security firm Kaspersky reported on a new malware threat that it calls the most sophisticated it has seen in targeting Android phones.
View ArticleOn the Asymptotic Performance of Bit-Wise Decoders for Coded Modulation
Two decoder structures for coded modulation over the Gaussian and flat fading channels are studied: the maximum likelihood symbol-wise decoder, and the (suboptimal) bit-wise decoder based on the...
View ArticleLessons for any company considering a tablet deployment
Patrick Gray offers some lessons that were learned about tablet deployment during a shopping trip at a retail store.
View ArticleQ and A with Patrick Ancipink, CA Technologies on new Cloud report
Here's a look at the recently published report Cloud Succeeds. Now what?
View ArticleEverything you need to know about using TOR
TOR's anonymizing and encrypting features make it a very useful tool for privacy. Here's a quick look at the basics.
View ArticleThe NSA and Big Data
While your company may not be subjected to the global scrutiny befalling the NSA and U.S. intelligence gathering apparatus, the "Big Snooping" capabilities engendered by Big Data must be used in a...
View ArticleEmail encryption: Using PGP and S/MIME
For those worried about the security and privacy of email communications, encryption is one layer to add, but using encryption software isn't terribly user-friendly.
View Article
More Pages to Explore .....