Citrix Nails Its Enterprise Mobility Strategy
Many customers and colleagues have asked me why Citrix acquired an MDM provider -- what are the value-adds and isn't the world moving towards MAM anyway? To answer, we have to make a clear distinction between the use cases. I agree and concur that for BYOD initiatives, MAM is a better, cleaner way of doing this things and that MDM is not the ideal solution.
Review: Better performance with FancyCache
Romex Software states that FancyCache uses state-of-the-art read and write cache algorithms that predict what data should hit the memory reserve for optimum performance gains. If you want to tweak the caching method yourself, the settings area provides a wealth of options to tweak and mess around with to your satisfaction.
Apple blacklists old Flash Player in Safari after recent attacks
Days after Adobe released a patch for flaws being exploited in Flash Player, Apple has begun blocking older versions of the software in an effort to encourage users to update their systems. "To help protect users from a recent vulnerability, Apple has updated the web plug-in-blocking mechanism to disable older versions of the web plug-in: Adobe Flash Player," Apple said in a new support document.
One-on-one with Randy Bias: Cloud standards and the battle for control
In this one-on-one interview, Randy Bias, co-founder and chief technology officer of open source cloud infrastructure provider Cloudscaling, talks about the lack of cloud standards among providers and how today's cloud computing service provider patchwork will ultimately give way to a more uniform cloud universe.
HTML5 Web Storage loophole can be abused to fill hard disks with junk data
A security researcher has found a loophole in how the HTML5 Web Storage standard is implemented in the Google Chrome, Internet Explorer and Apple Safari browsers that could allow malicious websites to fill visitors' hard disk drives with large amounts of junk data. ... The localStorage attribute of the Web Storage API allows websites to store between 2.5MB and 10MB of data per origin -- domain name -- depending on the browser used.
jQuery DataTables in asp.net with CRUD
Here is a very nice article on using jQuery data tables in ASP.NET. Though the article dates back to January 2011, it is still very relevant and valid. Thanks to my friend Mr. Kamaraj Palsamy for referring this article to me.
Disruptive? That Depends
"Disruptive" can be defined as a threat to order, or as an interruption to whatever it is we're doing now. When it comes to technology, the word has been misued, sometimes just to attract attention. In the same way coincidence has been confused with irony, disruptive has become a different way of saying "new and popular."
How CIOs Can Help Manage Disruptive Technology
Quite a few people think that entrepreneurship in large companies is an oxymoron. In March of 2009, The Economist published a very good special report on entrepreneurship. Its lead article defined the term as: “somebody who offers an innovative solution to a (frequently unrecognised) problem. The defining characteristic of entrepreneurship, then, is not the size of the company but the act of innovation.”
IT Department Reorgs Are on the Horizon
Given the opportunity, more than one-fourth (27 percent) of IT and business leaders would rebuild their IT departments from scratch, according to an IDG Enterprise survey of 696 senior IT and business executives. That approach may be more radical than most, but the "Future State of the IT Organization" study shows that IT departments are headed for profound changes as CIOs try to refocus their staffs on business results such as revenue, customer service and product innovation
Cyberinsurance is latest small business safety net
Many customers and colleagues have asked me why Citrix acquired an MDM provider -- what are the value-adds and isn't the world moving towards MAM anyway? To answer, we have to make a clear distinction between the use cases. I agree and concur that for BYOD initiatives, MAM is a better, cleaner way of doing this things and that MDM is not the ideal solution.
Review: Better performance with FancyCache
Romex Software states that FancyCache uses state-of-the-art read and write cache algorithms that predict what data should hit the memory reserve for optimum performance gains. If you want to tweak the caching method yourself, the settings area provides a wealth of options to tweak and mess around with to your satisfaction.
Apple blacklists old Flash Player in Safari after recent attacks
Days after Adobe released a patch for flaws being exploited in Flash Player, Apple has begun blocking older versions of the software in an effort to encourage users to update their systems. "To help protect users from a recent vulnerability, Apple has updated the web plug-in-blocking mechanism to disable older versions of the web plug-in: Adobe Flash Player," Apple said in a new support document.
One-on-one with Randy Bias: Cloud standards and the battle for control
In this one-on-one interview, Randy Bias, co-founder and chief technology officer of open source cloud infrastructure provider Cloudscaling, talks about the lack of cloud standards among providers and how today's cloud computing service provider patchwork will ultimately give way to a more uniform cloud universe.
HTML5 Web Storage loophole can be abused to fill hard disks with junk data
A security researcher has found a loophole in how the HTML5 Web Storage standard is implemented in the Google Chrome, Internet Explorer and Apple Safari browsers that could allow malicious websites to fill visitors' hard disk drives with large amounts of junk data. ... The localStorage attribute of the Web Storage API allows websites to store between 2.5MB and 10MB of data per origin -- domain name -- depending on the browser used.
jQuery DataTables in asp.net with CRUD
Here is a very nice article on using jQuery data tables in ASP.NET. Though the article dates back to January 2011, it is still very relevant and valid. Thanks to my friend Mr. Kamaraj Palsamy for referring this article to me.
Disruptive? That Depends
"Disruptive" can be defined as a threat to order, or as an interruption to whatever it is we're doing now. When it comes to technology, the word has been misued, sometimes just to attract attention. In the same way coincidence has been confused with irony, disruptive has become a different way of saying "new and popular."
How CIOs Can Help Manage Disruptive Technology
Quite a few people think that entrepreneurship in large companies is an oxymoron. In March of 2009, The Economist published a very good special report on entrepreneurship. Its lead article defined the term as: “somebody who offers an innovative solution to a (frequently unrecognised) problem. The defining characteristic of entrepreneurship, then, is not the size of the company but the act of innovation.”
IT Department Reorgs Are on the Horizon
Given the opportunity, more than one-fourth (27 percent) of IT and business leaders would rebuild their IT departments from scratch, according to an IDG Enterprise survey of 696 senior IT and business executives. That approach may be more radical than most, but the "Future State of the IT Organization" study shows that IT departments are headed for profound changes as CIOs try to refocus their staffs on business results such as revenue, customer service and product innovation
Cyberinsurance is latest small business safety net
While cyber policies reimburse a business for the damages it must pay its customers, they do much more. A victim of a cyber loss must first investigate the cause, often with the use of IT forensic examiners. The company must then comply with required notices to potentially affected customers. ... Cyber insurance can cover the costs of paying regulatory fines and penalties.
Quote for the day:
"A problem is a chance for you to do your best." -- Duke Ellington
Quote for the day:
"A problem is a chance for you to do your best." -- Duke Ellington
No comments:
Post a Comment