First Business


Topic: Information Technology

Study: Companies not as secure as they think

CompTIA says 80 percent of companies surveyed believe their security is satisfactory, but only 13 percent had made changes since embracing cloud and BYOD

Read Full Article
Source: InfoWorld


Topic: Information Technology

The Unintended Consequences When Workers Bring Their Devices to Work

HR can play a front-and-center role in managing the unintended consequences of tension and mistrust by working with IT to create policies that balance the corporation’s security needs with the employees confidentiality and privacy requirements.

Read Full Article
Source: TLNT


Topic: Information Technology

The Heartbleed Hit List: The Passwords You Need to Change Right Now

An encryption flaw called the Heartbleed bug is already being called one of the biggest security threats the Internet has ever seen. The bug has affected many popular websites and services ones you might use every day, like Gmail and Facebook and could have quietly exposed your sensitive account information (such as passwords and credit card numbers) over the past two years.

Read Full Article
Source: Mashable


Topic: Information Technology

Windows XP Isn't Safe to Use Anymore. Here's What to Do Next.

Despite Microsoft’s best efforts to convince everyone to upgrade to a newer version of Windows, Windows XP is still running on nearly 28% of all computers connected to the Internet. That’s a lot of computers and users. So what can those users do now?

Read Full Article
Source: Mashable


Topic: Information Technology

Which Windows operating system am I running?

Are you using Windows XP? Not sure? This link from Microsoft will auto-detect your operating system and let you know what you’re running.

Read Full Article
Source: Microsoft


Topic: Information Technology

Shift to Native Advertising Explained

In light of some recent promising figures, marketers have increasingly invested in native advertising. More than half of consumers who click on native ads do so with the intention of purchasing something, compared with just 34 percent who click on banner ads.

Read Full Article
Source: Inc.


Topic: Information Technology

How to Create a Super Strong Password

By now you should know that "123456" is not a smart password. If you’re still using a weak password like that gaping sieve -- and haven’t even changed all your online passwords since news of the wretched Heartbleed SSL vulnerability broke -- you’re hacker bait.

Read Full Article
Source: Entrepreneur


Topic: Information Technology

Do enterprises need a chief data scientist?

Enterprises are increasingly focused on using big data and analytics to help them better understand both the requirements of their customers, trends and patterns of customer activity and this requires a different approach. Dell says that this trend means that enterprises need a new type of leader, a chief data scientist, to help ask the right questions, in the right way and drive the transition to the data-driven enterprise.

Read Full Article
Source: ZD Net


Topic: Information Technology

11 Little-Known Apps that Entreprenuers can't live Without

Want to get more productive? FAST COMPANY asked amazing female entrepreneurs - like Rachel Sklar, Whitney Johnson, Cindy Gallop, Leandra Medine, and Stacy London - to share their favorite apps.

Read Full Article
Source: Fast Company


Topic: Information Technology

2 do's and 2 don'ts when migrating apps to the cloud

Relocating an application and data set running on a traditional platform to a cloud-based platform might seem like a humdrum shift. However, you must take into account many points before, during, and after the move. In many instances, you can boil down these considerations to simple do’s and don’ts.

Read Full Article
Source: InfoWorld


Topic: Information Technology

App Turns Any Surface into a Touchscreen

Ubi Interactive, one of 11 companies chosen to be part of Microsoft Kinect’s first accelerator group, is now taking orders for a piece of software that works with the 3-D Kinect sensor, a Windows 8 computer, and a regular overhead projector to turn any surface into a touchscreen.

Read Full Article
Source: Fast Company


Topic: Information Technology

IT: Cyber Security in the Internet of Things

Every enterprise will be affected by the Internet of Things (IoT), the growing phenomenon by which not only people, but also "things" vehicles, commercial and industrial equipment, medical devices, remote sensors in natural environments are linked to networks that are connected to the internet. Expect the impact on your business to be profound.

Read Full Article
Source: Harvard Business Review


Topic: Information Technology

Want to Build an App? Read This First

So you have a great idea, but lack the technical skills to build it? Here are the four big things you need to know before you begin building.

Read Full Article
Source: Inc.


Topic: Information Technology

One in five data breaches are the result of cyber espionage, Verizon says

Even though the majority of data breaches continue to be the result of financially motivated cyber criminal attacks, cyber espionage activities are also responsible for a significant number of data theft incidents, according to a report that will be released Tuesday by Verizon.

Read Full Article
Source: InfoWorld


Topic: Information Technology

The 21 worst tech habits -- and how to break them

Are you guilty of a bad tech habit? Here are 21 of the worst technology-oriented habits, plus potential fixes for all of them. (And we have a bonus at the end, on mending bad email habits.)

Read Full Article
Source: InfoWorld


Topic: Information Technology

Six Numbers Reveal the Booming Business of Auto-Analytics

Nike learned from studying millions of users, the magic number of times a runner needs to see her data before becoming a more "science-based" runner is just five. Once a person crosses that threshold they are "massively more likely" to keep running by metrics than by feel alone.

Read Full Article
Source: Harvard Business Review


Topic: Information Technology

Is SharePoint a Failed Vision for Collaboration?

Has the massive investment in SharePoint lived up to its promise as the uber-collaboration platform for the enterprise?

Read Full Article
Source: CMS Wire


Topic: Information Technology

Execs: Your Online Personal Assistant

Not everything in the development world is about building a new feature for an app that will help you take better photos. Here’s a look at an app that’s bringing real-world services into the app ecosystem.

Read Full Article
Source: The Wall Street Journal


Topic: Information Technology

What Big Data Means for Manufacturers

Big Datayou hear about it everywhere these days. What makes it different from ordinary data? How big is big? And what does it mean for manufacturers, large and small?

Read Full Article
Source: Manufacturing Pulse


Topic: Information Technology

IT risk assessment frameworks: real-world experience

Assessing and managing risk is a high priority for many organizations, and given the turbulent state of information security vulnerabilities and the need to be compliant with so many regulations, it’s a huge challenge. …

Read Full Article
Source: CSO


Topic: Information Technology

What the software-defined data center really means

You know the story of how the Internet was created: The military wanted a redundant "network of networks" and figured out how to do it with a new protocol using existing networking equipment. Something nearly as historic …

Read Full Article
Source: InfoWorld


Topic: Information Technology

Spammers getting better, filters getting worse

Four months ago, I talked about the study conducted by Virus Bulletin -- the VB100 antivirus test company -- that showed commercial spam blockers were getting worse. Today, a new study (summary; PDF full report for …

Read Full Article
Source: InfoWorld


Topic: Information Technology

Good IT architecture means knowing when to take control

Should the management of your IT architecture be centralized or decentralized? Last week’s Advice Line took the position that ETAM (enterprise technical architecture management) is a regulatory function, and that this is …

Read Full Article
Source: InfoWorld


Topic: Information Technology

What IT can do now that user passwords aren't safe

The parade of revelations of passwords stolen from online services -- LinkedIn (where poor implementation meant nearly two-thirds could be descrypted), eHarmony, and Last.fm most recently -- has many workers and IT pros …

Read Full Article
Source: InfoWorld


Topic: Information Technology

6 Ways CIOs Can Make Peace with CMOs

There’s a natural tension between IT and marketing. But these days the CIO and CMO need to collaborate and focus on what’s best for the customer. CIO -- It seemed so straightforward. The marketers at Genworth Financial …

Read Full Article
Source: CIo


Topic: Information Technology

Who owns what when employees use their own tech

My Twitter colleague Brian Katz (@bmkatz) relayed to me and his other Twitter followers a question asked in various forms at this week’s Interop conference: Who owns the phone number for a BYOD item? Who owns the Twitter …

Read Full Article
Source: InfoWorld


Topic: Information Technology

Pick your strategy for BYOD

Two main schools of thought guide the adoption of BYOD in the enterprise. One is to reduce the risk of the devices themselves by managing them closely through policy and software. The other is to reduce the risk to data that …

Read Full Article
Source: InfoWorld


Topic: Information Technology

Fave raves: IT pros name their favorite products

Each year we ask IT pros what they love -- which tech products make their lives easier, provide stellar security and compliance, and help keep end users happy and productive. IT pros answered our questions and raved about a …

Read Full Article
Source: InfoWorld


Topic: Information Technology

Mobile apps: The IT pro's new power tools

Think the mobile revolution is all about word games and social networking apps? Think again. Heavy-duty apps for IT pros have arrived on mobile platforms and they’re quickly changing the face of IT systems …

Read Full Article
Source: InfoWorld


Topic: Information Technology

Still Don’t Have a Smartphone Policy? Join the Club – and Maybe the Lawsuit

Five years after the iPhone was introduced, companies are still struggling with how to handle after-hours usage by their employees.

Read Full Article
Source: tlnt.com


Topic: Information Technology

Say Goodbye to Junk Email

Two new tools can help tame your overflowing email inbox..

Read Full Article
Source: inc.com


Topic: Information Technology

13 Business Apps for Busy Entrepreneurs

Business owners can perform a variety of tasks on those smartphones when they’re away from the office -- far away, in fact, like on a beach or ski lift.

Read Full Article
Source: Entrepreneur


Topic: Information Technology

As enterprise storage demands escalate, disk densities continue to rise.

With existing hard drive technologies ending their decade-long run of ever-increasing densities, IT shops are waiting for new technologies such as shingled magnetic recording (SMR) and phase-change memory (PCM) to boost storage densities.

Read Full Article
Source: InfoWorld


Topic: Information Technology

How to Do an SEO Audit of Your Website

Because search engine optimization (SEO) best practices and procedures change all the time, business owners should conduct periodic assessments to determine whether or not adjustments need to be made.

Read Full Article
Source:


Topic: Information Technology

10 Technologies That Changed Business Forever

Remember when you first saw the iPhone? Glimmering like a rare jewel at the Apple store, the debut model was originally dismissed as a bit player in the enterprise, especially compared to the (ahem) BlackBerry. Now, just …

Read Full Article
Source: CIO


Topic: Information Technology

How to optimize your iPad for business

Are you thinking about snapping up a new iPad? The post-PC lifestyle is especially intriguing for business owners who travel on a regular basis and want to travel lightly. It’s easy to forget that the tablet, for all of its …

Read Full Article
Source: Mashable Tech


Topic: Information Technology

Deciding Whether Your Business Needs a Mobile App

Mobile applications can be one of the best ways to keep your consumers engaged with your brand as they are on the move. But first you have to decide whether or not you actually need it. Here’s how to make that decision.

Read Full Article
Source: Inc.


Topic: Information Technology

Six habits of highly efficient data centers

Organizations are raising the bar for energy efficiency with free cooling, DC power, modular data centers, and better collaboration.

Read Full Article
Source: Infoworld.com


Topic: Information Technology

12 industry disaster scenarios

The end of the world may or may not be nigh, but in the tech industry, many of these possibilities could easily become reality.

Read Full Article
Source: InfoWorld.com


Topic: Information Technology

How to switch from the iPhone to Android

You don’t have to give up the whole Apple ecosystem to embrace a Galaxy S III or other Android smartphone.

Read Full Article
Source: InfoWorld.com


Topic: Information Technology

Disposing of Data — Do It Responsibly

Here are some general and easy-to-follow guidelines.

Read Full Article
Source: Better Business Bureau


Topic: Information Technology

Becoming ‘PCI Compliant’ If You Accept Credit Cards

Nearly all businesses today accept credit and debit cards as a form of payment.

Read Full Article
Source: Better Business Bureau


Topic: Information Technology

Securing Sensitive Data — Start with the Basics

Customers expect that every business large or small that collects their sensitive personal information will protect it.

Read Full Article
Source: Better Business Bureau


Topic: Information Technology

Ten Cybersecurity Strategies for Small Businesses

Businesses need a cybersecurity strategy to protect their own business, their customers, and their data from growing cybersecurity threats.

Read Full Article
Source: uschamber.com


Topic: Information Technology

Tracking Inventory Have You Stressed? Try These 5 Mobile Apps

Here are five mobile apps that let you update and check your level of supplies or product on hand -- from anywhere.

Read Full Article
Source: Entrepreneur.com


Topic: Information Technology

Your guide to the year's best technology

To have an eye for the best new technology, particularly enterprise technology, you need to look beyond sheer coolness and consider how those products or services fit in with the fabric of what’s already been deployed.

Read Full Article
Source: InfoWorld.com


Topic: Information Technology

8 options for taming small business expenses

Still messing around with paper receipts? There are plenty of cloud and mobile services that promise to make the expense management process far more efficient. Here are just a few.

Read Full Article
Source: ZDNET.com


Topic: Information Technology

Here's a Better Way to Remember Things

Remembering new information is an underappreciated skill. The fact that most of us have never evolved our technique beyond the rudimentary and ad hoc approaches we used as middle schoolers suggests this.

Read Full Article
Source: Harvard Business Review


Topic: Information Technology

Office Technology for Every Stage of Your Business

Our handy guide can help. It’ll show you what the leap from a one-person startup to a 10-person team looks like, help you minimize the potential headaches ahead, budget for future expansion and understand how such tools can contribute to the growth of your business.

Read Full Article
Source: Entrepreneur.com


Topic: Information Technology

The advantages of IT on a shoestring budget

Many enterprises can learn a few things from the cheap, self-supporting nature of service provider IT operations.

Read Full Article
Source: InfoWorld.com