To help give developers more details about using and building Google Cloud Platform apps, Google will conduct live events starting April 8 in 26 cities.
IBM this year expanded its Master the Mainframe Contest to include a new IBM Master the Mainframe World Championship competition. The competition is designed to assemble the best university students from around the globe, ones who have demonstrated superior technical skills through participation in their regional IBM Master the Mainframe contests. As part of IBM's commitment to develop the skills of a new generation of mainframe experts, the competition will highlight the modern capabilities of the mainframe, designed to handle the big data, cloud, security and mobile computing workloads that are prevalent in today's enterprises. The top 43 students from 23 countries have been invited to participate in the inaugural IBM Master the Mainframe World Championship. To kick things off, IBM has launched the Master the Mainframe World Championship Website. The site profiles each student and provides a leader board so fans can follow their favorite contestant, school and country. In addition to the contestants' information, the Website highlights the judges, who represent a cross section of the IT industry and who are participating in the April 7 final championship event in New York City. IBM also will be holding a special ceremony celebrating the 50th anniversary of the IBM mainframe on April 8 in New York City.
Mobile security has become one of the most important concerns for enterprise IT decision-makers. Mobile devices and applications have become ubiquitous in the corporate world, and they've brought with them a multitude of new security concerns. From poorly built apps to issues with operating systems, the sheer number of ways in which hackers can infiltrate mobile platforms is staggering. That was made clear in a study commissioned by security firm Webroot, which found that 83 percent of IT professionals believe mobile devices are a "high security risk" in enterprises. What's worse, the increased risk caused companies to spend more on support and fixing mobile issues. Mobile security issues, meanwhile, have made employees less productive. This means that the need for improved mobile security measures is greater than ever. With that in mind, eWEEK has found five apps for iOS and five for Android that are designed to improve device security. While no application can guarantee complete security, the following applications are worth downloading or at least evaluating.
An emerging approach to virtualization is getting set for broader commercial adoption as certification and technology efforts advance.
Due out in two weeks, the new Android SDK will give developers the needed tools to create cool new applications for wearable devices.
Big data storage (and the analytics processing that uses all that raw data) is a burgeoning market that is growing at a 40 percent compound annual rate.
A new update for users of Microsoft's latest OS remedies one of the multiplatform software's biggest annoyances and ensures that mobile and desktop Skype clients are no longer out of sync.
Google faces a $5 billion fine in the ongoing probe, which is being conducted by the Competition Commission of India, a watchdog agency, according to a report.
NEWS ANALYSIS: CeBIT 2014's Top Innovator collection includes a massive big data display, while the Internet of Things display shows off everything from connected luggage to huge crop harvesters.
The recent Parallels Summit was all about providing useful, progressive and affordable IT products and services for small and midsize businesses—markets that are flourishing as the U.S. economy improves as we move deeper into the second decade of the new century. In the United States alone, the SMB cloud market is now $24 billion and is forecast to grow at a healthy 17 percent rate through 2017. This growth is driven by unified communications and other online business applications. Not only do these trends identify mobile devices, cloud services and better service-level agreements that make complicated processes simpler, they also point toward more do-it-yourself provisioning and deployment—especially for storage and computing services. What about networking and security? Well, those probably ought to stay in the hands of specific professionals. This eWEEK slide show uses industry information from storage and disaster-recovery provider Acronis to identify the key areas of need for SMBs in 2014 and beyond.
BlackBerry apologizes for confusion, saying it will make good on $10,000 Developer Commitment promises.
A Linux training course that once cost $2,500 is now free, as Linux Foundation ramps up its education efforts.
Despite the best efforts of many organizations to manage and protect data, companies are still experiencing significant breaches. Far from feeling safe and secure, most companies believe it is inevitable that another security breach will occur, according to a study commissioned by identity access management (IAM) specialist SailPoint. More than half of the companies surveyed (51 percent) feel it is "just a matter of time" before the next security breach happens. SailPoint commissioned Loudhouse to conduct research examining the current trends and concerns in IAM, which includes cloud computing and bring-your-own-device (BYOD) initiatives. While these new technologies bring greater employee freedom, flexibility and productivity, the resulting change and complexity for businesses often mean they are forever behind the curve. Four hundred U.S. and U.K. IT decision-makers at organizations with 5,000 or more employees across a range of industrial sectors completed the survey, which explored their opinions of and attitudes toward data security. eWEEK shares the study's findings.
RMS started a new developer network for partners and developers to build apps for its RMS(one) risk management platform.
NEWS ANALYSIS: Two subcommittees of the House Science Committee asked IT security experts to tell them if technology is available to improve the security of personal data.