In early September, Google announced that it would be integrating Google+ sign-in with its authorship program, making it even easier to make sure you get the credit for the content you create. This most recent development is just one in a long line of moves by Google toward integration of its existing products both with one another, and with the new products it continues to release.
If you're not familiar with Google Authorship, it's a markup that authors can use to link the content they create for their blog or website to their Google+ profile, and by extension their online identity. When setup correctly, an author's Google+ profile photo as well as a homepage address (when applicable) will be displayed next to their content's entry on the search engine results page (SERP).
The release of the latest Apple iPhones has financial experts questioning whether or not Apple's reputation is at stake due to the offering of a lower-end product. Contrary to previous years, Apple will be offering two different types of phones this month: the 5s and the 5c, which both go on sale September 20.
The iPhone 5c comes at a smaller price tag of just $99, ideal for those who are on a budget, as opposed to the 5s which is priced at $199 as the starting point. Some investors initially warned against the idea, saying that it may weaken margins and potentially tarnish a brand that has been linked to premium quality since 2007. However, a lower-end iPhone could prove to be a smart move for Apple.
When Windows 95 was released there was a lot of fuss about the Start menu and debate about whether it would catch-on. It was a significant departure from icon shortcuts in program groups; or superficially at least. In reality, it was simply the program groups (folders) put in a hierarchical order and rather wisely, the option to place folders, icons and shortcuts on the desktop remained (to this day).
The Start menu developed; it grew out of the logic of the program shortcut and built upon that logic. It was not intended to abruptly impose a new paradigm but to slowly replace the shortcut as customers became comfortable with the concept. That journey never really ended, as the icon shortcut was not phased-out -- why would it be?
The Information Technology (IT) department is the oxygen of the business world. It’s crucial, but, many times, invisible. In fact, many of the complex processes that IT supports are most successful when nobody notices them at all. They just happen, and all is well. When something goes wrong, IT goes into fire-fighting mode and people start scrutinizing, asking questions and second-guessing.
The problem takes center stage and pushes all other IT priorities aside. It costs time, money and focus. Problems can cost reputations and customers, too.
How the Ubisoft hack shows the password model is weak, and why device-based authentication is the answer
Just over a week ago game maker Ubisoft revealed that hackers had breached its database and accessed customer information including usernames, email addresses, and passwords. This is the latest in a series in hacks revealing that the outdated password authentication model is weak and does not provide adequate security for user information.
It’s time for a network architecture that considers new access models -- including the device itself. We need a shift to device-based authentication that provides the same added security, but is completely transparent to the user. The cable industry has used this model for years, assigning cable boxes a unique identity so that users do not need to enter a password to change the channel (since the service is delivered to box, not the user). Applied to computing, device-based authentication means that even if a hacker steals your password, they still need your device to log into the website. The foundations of this model are already in place, but there is still work to do.
PRISM enables the NSA to categorically violate your right to privacy and reach far beyond the boundaries typically enforced by courts. So why aren’t the politicians furious about this?
They instead seem to be focused on Edward Snowden. Since his leak of the PowerPoint slides detailing the NSA’s surveillance program, politicians from both parties -- including the liberal Nancy Pelosi and Republican House Speaker John Boehner -- have called his arrest.
Edward Snowden’s revelations about what data big companies like Facebook, Google or Skype give to the NSA -- and therefore to the US Government -- confirm what many already know: the internet is not a safe place.
Snowden’s leaks set alarms off in the business world, too. Even though people think our personal conversations and what we post online is monitored, many were unaware that company communications are also intercepted for espionage purposes. The USA and UK take the lead in this practice, but recent news suggests these governments aren’t the only ones. Other countries -- such as France -- have their own intelligence projects.
It has been a very rough year for Java from a security point of view.
Two-thousand thirteen started with a number of zero-day attacks targeting Java, including those that resulted in breaches at Microsoft, Facebook, Apple and Twitter. As the year went on, the Department of Homeland Security and others recommended disabling or even uninstalling Java. Apple went so far as to effectively block the Java 7 web plugins twice in one month on OS X. As the security situation around Java seemed to deteriorate, the criticism of and frustration with Oracle continued to increase.
In 1986, when BusinessWeek introduced "Management’s Newest Star," inviting us to "Meet the Chief Information Officer," the idea of adding anyone else to the C-Suite was not only revolutionary, it was frightening. Business computing was still a burgeoning field. Typewriters and paper files were the status quo. A CIO wasn’t just a new officer: a CIO was a new way of doing things -- everything.
And yet, less than 30 years later, it feels as if the CIO role has always been there: making decisions on key hardware and software purchases, working with his business-side counterparts to determine how to align software and strategy, monitoring new trends and technologies to determine which are worth implementing and which should be ignored. It’s hard to imagine any mid- to large-sized businesses without a CIO on board.
If you don’t know what you want, how will you know when you find it? When selecting new enterprise software, most people completely underestimate the importance of requirements. You often hear things like "Identify your requirements, and focus on the most important ones". How easy to say, but how difficult to do! Like foundations are to a building, requirements are to software selection. If your requirements are defective, anything built on them is at risk.
Recently the US Air Force scrapped a massive ERP project after racking up $1B in costs. When the Senate probe into the failure has been completed, inadequate requirements can almost be guaranteed to have been a major contributor to this software disaster. An appropriate web search shows industry is replete with these software selection failures, but this is only the tip of the iceberg. Most of the time these problems don’t bubble up into the press or lawsuits, rather they simmer in the background, quietly corroding business productivity and sometimes destroying careers.
Your iPhone/Android is cool -- this we know. But, they wouldn’t be half as cool without apps. Apps are the icing on a smartphone -- minus the calories -- and we have a ravenous appetite for them. But cool apps aren’t isolated to just phones any more, as we’ve seen with new tech products like Google Glass.
Glass already has the usual suspects of apps, but what Glass really needs is to go nuts with apps that sound too good to be true.
The gaming market isn’t what it used to be. With smartphones and tablets able to play high quality single and multiplayer titles, the casual gamer really has no need for a dedicated gaming console. Both Sony and Microsoft knew this when dreaming up their next generation consoles and took strategic decisions to keep them in the game (pun intended).
After the Xbox One reveal it was clear that Microsoft’s focus is now on casual and non-gamers. The whole presentation was a pitch for an all-in-one entertainment system rather than a traditional gaming console.
I was weeding through my Steam friends list the other night, looking to remove some of the people that I never see online or playing games anymore. As I scrolled through, I noticed that there were several folks on my list that hadn't signed on for one-hundred days or more. By default, Steam starts itself upon boot, with the option to automatically log yourself in as well.
It made me wonder why these people that I had played with every day or two hadn't so much as even started up the program in such a long time. After all, I don't just send or accept friend requests on a whim. I've only ever add people that I've played with a multitude of times and have spoken to directly via voice-chat or text in-game on a regular basis.
Microsoft continues the trend of expanding the interoperability options of its flagship unified communications product, Lync Server 2013 -- federation with Skype arrives in June.
Microsoft Lync Server 2013 is an already impressive offering with instant messaging, presence, enterprise telephony, conferencing and collaboration features out of the box. The latest version of the Lync client features even tighter integration with Microsoft Office, as well as a robust mobile version for the three major platforms. Lync Server 2013 is also being touted as an enterprise ready PBX replacement with major improvements around high availability and disaster recovery options. Other highlights include support for a hybrid voice topology that integrates with Lync online, and support for virtualizing all workloads including voice. The product continues to make impressive inroads with enterprise customers, already adopted by 70 percent of the Fortune 500.
This week, Twitter’s OAauth keys leaked to Github. So what does that mean? Don’t panic. The consequences of a client application’s key being compromised are not as serious as user credentials being compromised. The risk associated with this breach is that a malicious application tricking you in participating in an OAuth handshake could access the Twitter API on your behalf. Attackers might come up with clever ways to exploit this leak.
In the meantime, avoid using Twitter through any application that you do not trust. If you seem to be redirected to Twitter after clicking a link or through any other means unexpectedly, don’t consent to an application accessing Twitter on your behalf even if this appears to be pointing to an application you trust.