Monthly Archives: April 2015
Five Things You Didn’t Know GIS Could Do
Five Things You Didn't Know GIS Could Do
by Darryl K. Taft
Fuel Your Coffee Fix
Notice a new Starbucks on your block? It wasn't placed there...
Major Milestones in Microsoft’s Storied 40-Year History
Major Milestones in Microsoft's Storied 40-Year History
By Don Reisinger
It Started With Bill Gates and Paul Allen
The Microsoft story got its start in 1975 with...
AMD Notches Embedded Win With Samsung
Advanced Micro Devices' efforts in building out its embedded business will play a key role in how the chip maker's future rolls out.The embedded...
Mobile, Cloud to Boost Mergers, Acquisitions Market in 2015
Market opportunities in security, mobile, cloud and data and analytics technologies will drive tech industry mergers and acquisitions (M&A) in 2015, according to a...
IBM, NASA Challenge Developers to Build Apps on IBM Cloud
Building on a partnership that extends back to NASA’s inception and helped put the first man on the moon, IBM and NASA are collaborating...
Black Duck Launches Open-Source Security Solution
Black Duck Software has announced a new open source security platform that helps security and development teams find and fix open source vulnerabilities.The Black...
SolarWinds Database Performance Analyzer Available on AWS
SolarWinds announced enhancements to its IT performance management platform. The upgrades are designed to improve application performance by optimizing SQL Server, Oracle and other...
Mobile App Users Want Apps in Their Native Language
Almost half of mobile device applications on smartphones and tablets are in their user’s native language, according to a survey of 800 consumers worldwide...
Caltech Chip Could Turn Smartphone Into 3D Scanner
A tiny high-resolution 3D scanner could one day be built into a smartphone, enabling users to easily scan an object in 3D and then...
Former Cyber-Security Czar Says Network Perimeter Defenses Don’t Work
The big question about enterprise security isn't how to keep cyber-criminals out of your network; the big question is how to limit the damage.According...