cioinsight.com
Home > RSS Feeds > News & Analysis
  • LAS VEGAS—Big Blue held the first IBM InterConnect conference this week. The event, which drew more than 21,000 people, combined three previously separate conferences: IBM Pulse, IBM Innovate and IBM Impact. To address the increasingly worrisome issue of data sprawl, IBM introduced a series of new cloud computing technologies and investments to help enterprises securely connect apps, data and services across many traditional systems and clouds. IBM said it has dedicated more than half its cloud development team to this effort, including more than 1,000 developers focused on delivering hybrid cloud innovations based on open technology. IBM is delivering a series of technologies and services on the IBM Cloud that will extend users' control, visibility, security and governance of their private cloud or traditional IT systems to the public cloud, also offering increased data portability across environments and making it easier for developers to work across cloud and non-cloud environments. "Today, we are launching a new class of cloud innovations that extend open-standards capabilities for the enterprise," Robert LeBlanc, senior vice president of IBM Cloud, said in a statement. eWEEK offers highlights from the conference.

  • Microsoft, Symantec, AnubisNetworks and Europol work together to take down Ramnit, malware that infected more than an estimated 3.2 million computers over four years.

  • In a 3-2 vote, new net neutrality rules were approved by the FCC on Feb. 26 that will allow the agency to protect broadband Net access as a public utility. Critics already vow to file lawsuits.

  • NEWS ANALYSIS: Congressional hearing witnesses warn that the FCC is about to vote on network neutrality rules that are certain to be gridlocked by years of litigation.

  • BlackBerry Classic will go for $99.99 after a $50 rebate under a 2-year contract with Verizon. It will be available online Feb. 26 and in Verizon stores March 5.

  • FireEye's Mandiant M-Trends report reveals that most breaches are not found by enterprises on their own.

  • The introduction of the Galaxy S6, the next flagship phone from Samsung, is just days away, and reports about its rumored features are circulating steadily. After the Galaxy S6 is announced at Samsung Unpacked on March 1, the device will compete with Apple's iPhone 6 line. Apple and Samsung have been battling for years for the top position in the smartphone market, and the iPhone 6 and Galaxy S6 are sure to keep that rivalry going in a head-to-head race. This slide show compares features expected to appear in the Galaxy S6 with those already available in the iPhone 6. Samsung hasn't divulged all the features it will build into the Galaxy 6, so the comparison is based on the steady stream of market rumors about the new smartphone's design.  But as the date of Samsung Unpacked, which is scheduled to take place during the Mobile World Congress in Barcelona, Spain, approaches, more credible reports are emerging from market analysts and from T-Mobile, which is expected to market the Galaxy S6. Read on to find out what features are likely to show up in the Galaxy S6 and how those features compare to the device's top competitor, the iPhone 6.

  • If you're an IT manager or admin at any level, and you're unconcerned about the threat of malicious attacks on your enterprise's security system, then you are in a distinct minority. Reliable data and application protection is constantly at or near the top of every CIO's, CTO's, data center manager's and IT administrator's priority list the world over. Only two weeks ago, at a White House-sponsored cyber-security summit at Stanford University, President Obama said that cyber-security-related terrorist threats to governments and companies have increased fivefold since 2009—specifically mentioning the highly publicized Sony Pictures hack of last fall. He also noted that more than 100 million businesses and individuals were hit by online-related fraud or theft in 2014 alone. "No company has ever said they worked too hard to protect their systems and customers," Obama said. With this in mind, eWEEK has collected best-practice advice from several IT security thought leaders and presented them here in slide show form.

  • IBM is opening two new SoftLayer cloud data centers and planning to open several more this year as it continues to build out its hybrid cloud infrastructure.

  • The four smartphones will each include displays ranging from 4-inches to 5-inches, as well as versions offering 3G or LTE connectivity to fit the needs of users.

  • Google acquired technology and IP from a mobile-payment venture Softcard. The move places Google in partnership with major backers of the technology.

  • A federal judge throws out an antitrust lawsuit against Google, finding that the plaintiffs failed to show that they were injured by Google’s behavior.

  • Since the Asus Zenbook UX305 was unveiled at the IFA consumer electronics show in 2014, the lightweight notebook has attracted the interest of enterprise customers as much for its affordable price as its thin, ultraportable design. But if PC market-share numbers are to be our guide, Asus is not a top player in the corporate computer market. But in 2014, it was ranked as the fifth-largest PC vendor in unit sales and wins its share of enterprise PC sales. The company has for the past several years watched competitors like Hewlett-Packard, Dell and Lenovo continue to dominate the enterprise notebook PC market. But the Asus Zenbook UX305 attracted a following last year by bridging the gap between beauty and function. In a price-sensitive market where enterprises are always looking to get the best-possible prices for their PC purchases, it offers a fine balance between two things IT decision-makers care about: form and function. This slide show will take a look at the Zenbook UX305 and find out why this handsome ultraportable has caught the attention of so many.

  • All of us are aware of the increasing number of video surveillance cameras deployed as we go about our daily lives. The uses range from airports to banks to schools, retail stores, street corners and private residences. As IP surveillance camera and analytics technology evolve, the uses of the networked digital video are expanding well outside pure safety and security to loss prevention and business analytics. Examples of business uses for digital video analytics include customer traffic monitoring (heat mapping), monitoring wait times at cash registers and calculating demographic interest in in-house advertising; we could go on. What this really means to IT is that video cameras are crossing "user lines," and seeing a wider investment and requiring additional IP-based infrastructure to support (network, servers and storage). This slide show, produced using eWEEK reporting and input from Vince Ricco, North America technology partner manager at network video specialist Axis Communications, offers key data points on these changes for IT and security managers.

  • Lenovo acknowledges the risks of Superfish adware, as new details emerge on how widespread other vendors' use of the underlying technology is.

Rocket Fuel