Monday December 23, 2024

Twitter Turns On The Firehose For Realtime Search Startups

When it comes to getting access to all the data that flows through Twitter, there are the 50,000 apps that drink from Twitter’s Streaming API, which is subject to various limits. And then there are the chosen few who get the full unlimited firehose of data, the more than 50 million Tweets a day coursing […]

CIO and companies look towards virtualization solutions

Virtualization management is increasingly more important as CIOs and companies look for every way possible to extract as much value as they can from their IT investments. For many, the answer is next generation tools that deliver proactive monitoring and predictive capacity analysis to enhance the most popular virtualization solutions and improve the odds of […]

Security Policies Should be Part of Normal Business Practices According to Federal Judge

A federal judge has rejected a proposed settlement by TD Ameritrade Inc. in a data breach lawsuit. That marks the second time in recent months that a court has weighed in on what it considers basic security standards for protecting data. The case stems from a 2007 breach that exposed more than 6 million customer […]

Employment down for IT professionals according to IEEE-USA

 The number of unemployed IT professionals, including  systems analysts, has reached 59,000 in the third quarter, up from 49,000 in the previous quarter. In 2001, there were 745,000 software engineers. In 2002, that number had fallen to 715,000 but then started to increase until the third quarter of 2008, when it reached 1.078 million; software engineer […]

Reasons to block instant messaging

In the workplace, instant messaging (IM)often replaces  e-mail and phone calls for user-to-user or group conversations. This includes frequent exchanges of files, records and other data, plus regular back-and-forth texting between coworkers or collaborators busy getting their jobs done. Though much IM traffic involves pairs of users, it’s neither difficult nor unusual for multiparty IM […]

Firefox is primary security risk faced by users

According to a security vulnerability report by Cenzic, Of all Web vulnerabilities, 90 percent pertained to code in commercial Web applications, while Web browsers comprised about 8 percent and Web servers about 2 percent. Of the browser vulnerabilities, Firefox had 44 percent of the total, but perhaps the biggest surprise was Safari, which formed 35 […]

Unused Servers Waste Engery and Critical IT Resources

Millions of servers around the world are doing little more than wasting energy, according to a new study. At least 15 percent of servers are not doing anything useful, said a majority (72 percent) of server managers polled by Kelton Research. In addition, 83 percent said they don’t have an adequate grasp of server utilization, […]

Protecting intellectual property – CIO role

The problem is, many companies devote resources to IT security assuming that the thieves and threats are on the outside, attempting to gain access to the network via malware and hack attempts. They ensure anti-malware and intrusion detection/prevention systems are in place, and restrict network access. What happens when the internal worker becomes the threat? […]

U.K.Inacts Big Brother Laws

Under the guise of the Digital Economy Bill, the UK proves without a doubt that truth is stranger than fiction and that 1984 mindsets rule in government. If illegal file sharing is suspected (not necessarily proven) within a home, all Internet access to that residence could be terminated and fines of up to £50,000 could […]

CIOs address security threats

Business processes today rely on vastly different methods of data storage and data exchange than even a few years ago. The objective is to provide full 360-degree security that protects against the widest range of attacks.The changes in the computing landscape make it essential that companies adopt a new approach to security. According to published […]