March 27, 2013

Microsoft confirms it's shut off Windows 8-Google Apps calendar sync
"This rift impacts both consumers and businesses negatively and needs to be addressed immediately. Impacted users won't change calendar services [just] to work with Windows 8, so it's up to Microsoft to do the right thing and implement CalDAV. [But] Google deserves ridicule for stopping EAS support, too."


Google Compute Engine: interview with NuoDB
Meet engineers from NuoDB: an elastically scalable SQL database built for the cloud. We will learn about their approach to distributed SQL databases and get a live demo. We'll cover the steps they took to get NuoDB running on Google Compute Engine, talk about how they evaluate infrastructure (both physical hardware and cloud), and reveal the results of their evaluation of Compute Engine performance.


The CIO: Facilitator of engaging employee experiences
IT leaders will never be able to expand the conversation about how technology can enable employees or redefine the relationship between IT and employees if the focus is on provisioning and managing technology. The conversations CIOs should be driving is how to design technology experiences which align technology with specific work tasks to drive actions that help employees achieve the outcomes they, and the business, desire.


Data management strategies: Toigo's 5 quick tips for clearing clutter
In this expert video presentation featuring Data Management Institute chairman and Storage Decisions speaker Jon Toigo, storage pros in need of new data management strategies in 2013 can learn five quick and simple ways to get started. View this video or read some of Toigo's comments below to find out how to implement good data hygiene policies without having to make it a year-long initiative.


Softphones provide better communication flexibility for BYOD era
"To be able to have one phone number regardless of the device or where they are physically located is a huge benefit," Myers said. "What company doesn't want their employees reachable or working 24 hours per day?" While organizations will likely never move to a single device that does both computing and telephony, it's not out of the realm of possibilities that a tablet and Bluetooth phone dongle could one day become the only equipment an IT department supplies to employees.


By Paying Employees To Live Near The Office, Imo Cuts Commutes, Ups Happiness
The principal benefits of living near where you work are almost too obvious to mention; the time that would have spent commuting simply goes back to things you love: family, friends, hobbies, sleep. But Imo has found there are secondary benefits, too. A five-mile radius (plus Palo Alto’s climate) makes active commutes, via bike or foot, more likely. Employees find they’re able to pop home during their lunch break to take care of a few quick chores.


Three Steps To Enterprise Cloud Migration
The first stage is co-location or rack hosting, a model in which hardware moves to an offsite data centre. ... The next stage would be managed services, with the hardware continuing to be owned but the services delivered by a third party. ... The final stage is the move to the cloud, a move, Mr Kalla says, that requires a mature and long-term outlook. “It’s a totally hand’s-off environment which might not please technical staff who typically like control".


The problem with the iPad
Everything about the device was built around making it as easy to use as possible. But it's possible to take simplicity too far, especially when enterprise users are concerned, and there's one aspect of the iPad that Apple may need to address to keep enterprise users happy, and that's file system access. Jean-Louis Gassée of The Guardian succinctly summed up the problem facing the iPad.


Performance tradeoffs of TCP Selective Acknowledgment
Selective acknowledgment (SACK) is an optional feature of TCP that is necessary to effectively use all of the available bandwidth of some networks. While SACK is good for throughput, processing this type of acknowledgment has proven to be CPU intensive for the TCP sender. This weakness can be exploited by a malicious peer even under commodity network conditions. This article presents experimental measurements that characterize the extent of the problem within the Linux® TCP stack. SACK is enabled by default on most distributions.


Outdated Java weak spots are widespread, Websense says
A new Websense report suggests that approximately 94 percent of endpoints that run Oracle's Java are vulnerable to at least one exploit, and we are ignoring updates at our own peril.  According to security researchers at Websense, it's not just zero-day attacks that remain a persistent threat. Instead, Java exploits are now a popular tool for cybercriminals.



Quote for the day:

"Talent hits a target no one else can hit; Genius hits a target no one else can see" -- Arthur Schopenhauer

No comments:

Post a Comment