news Red Hat Bets on Open Hybrid Cloud During his keynote at Red Hat Summit 2012, Red Hat's Paul Cormier outlined four new products and services designed to help IT customers adopt the open hybrid cloud. By Thor Olavsrud Jun 28, 2012 5 mins Linux Private Cloud Server Virtualization news In Pictures: The Best of Windows 8 Hardware (So Far) Microsoft hardware partners — and Microsoft itself — have some serious hardware waiting in the wings for the arrival of Windows 8. Here's a visual tour of upcoming Windows 8 tablets, ultrabooks and tablet/ultrabook hybrids. By Shane O'Neill Jun 27, 2012 6 mins Computers and Peripherals Small and Medium Business Windows news Open Source a $1 Billion Business, But Just Beginning At the opening keynote at Red Hat Summit 2012, CEO Jim Whitehurst describes open source as entering the mainstream. While it's reach a billion in revenue, the battle for the future is just beginning, he says. By Thor Olavsrud Jun 27, 2012 4 mins Developer Linux Open Source news How CIOs Can Find Time to Think Strategically From blogs to 'beer lists,' there are tricks for carving out time to think about creating competitive advantage for your business By June Drewry, Madeline Weiss Jun 27, 2012 3 mins CIO IT Strategy news Senate Cybersecurity Debate Looms, Will It Happen in July? With the 2012 legislative calendar running out of pages, there is still a window of opportunity for debate and passage of a comprehensive cybersecurity overhaul bill. By Kenneth Corbin Jun 26, 2012 4 mins Cybercrime Government Regulation news Sequestration Threatens Tech Firms, DoD Contractors and National Security With half a trillion dollars in defense cuts looming, technology firms and other defense contractors could be in store for major layoffs and facilities closures if sequestration plan takes effect. By Kenneth Corbin Jun 26, 2012 5 mins Government Government IT Manufacturing Industry news Apple Not Likely to Tolerate Orbitz Price Prejudice Online travel site Orbitz has admitted to pushing pricier hotel rooms at Mac users, a profit-seeking tactic that factors a user's underlying hardware into Web choices. Apple risks a backlash from customers who feel unprotected, says one industry By Tom Kaneshige Jun 26, 2012 4 mins Internet Laptops Tablets news New IBM Channel Chief: Partners Lead New Business Growth IBM is promoting local, skilled solution providers to C-suite customers — and, increasingly, the midmarket — for quicker implementation, lower costs and stronger ROI. That's the mission of Big Blue's channel chief, a 32-year IBM veteran a By D.H. Kass Jun 26, 2012 8 mins CIO IT Strategy Technology Industry news Social Media Sites Lead the Way for Security, Privacy Best Practices In the wake of a record year for data breaches, the Online Trust Alliance is challenging financial institutions, commerce sites and consumer-facing government sites to implement its slate of security and privacy best practices by November. By Thor Olavsrud Jun 25, 2012 5 mins Data Breach Intrusion Detection Software Phishing news What to Expect From Windows 8 and the Release Preview Last month's Windows 8 Release Preview provided a sneak peek at what Metro apps will look like. The non-Metro desktop remains a mystery, though, so enterprises hoping to at least decide whether to adopt Windows 8 may need to wait until its fina By Jonathan Hassell Jun 25, 2012 7 mins Laptops Small and Medium Business Windows news Will Digital Music Suffer If Universal Acquires EMI? The top executives of Universal Music Group and EMI defend the proposed acquisition at a Senate hearing, saying the music industry has dramatically changed with the rise of digital platforms and their companies joining would have minimal impact on th By Kenneth Corbin Jun 22, 2012 5 mins Government Regulation Technology Industry news LinkedIn Tip: How Businesses Can Target Status Updates LinkedIn's new 'Targeted Status Updates' lets you deliver relevant content to the right followers. Here's what company administrators need to know. By Kristin Burnham Jun 22, 2012 3 mins Consumer Electronics LinkedIn Social Networking Apps news Two Microsoft Surface Tablets, Two Processors One Microsoft Surface Tablet will run on Intel processors, the other on Nvidia. One will appeal to end users, the other to IT departments. Which is which isn't as obvious as it seems. By Rob Enderle Jun 22, 2012 5 mins IT Strategy Small and Medium Business Ultrabook news CIOs Need to Evolve or Be Left in the Dust The centralized IT function of old is under tremendous pressure from trends such as cloud computing, proliferation of consumer-focused mobile devices in the enterprise and Big Data analytics. According to a report by The Economist, as these trends er By Thor Olavsrud Jun 22, 2012 7 mins CIO Careers IT Leadership news Cisco Patches Vulnerabilities in VPN Client, Security Appliances Networking equipment vendor Cisco Systems released multiple security updates on Wednesday to address vulnerabilities in its AnyConnect Secure Mobility Client, ASA 5500 Series Adaptive Security Appliances, Cisco Catalyst 6500 Series ASA Services Modul By Lucian Constantin Jun 21, 2012 2 mins Patch Management Software Security VPN news Samsung Galaxy S III: 8 Key Features and Facts Samsung yesterday launched its latest handheld, the Galaxy S III, in New York City, and CIO.com's Al Sacco was on the scene. Here, he spotlights eight features that set the new smartphone apart, as well as some unique Samsung marketing initiativ By Al Sacco Jun 21, 2012 9 mins Carriers Small and Medium Business Smartphones news Patent Reform Law Will Benefit Tech Sector U.S. Patent and Trademark Office Director David Kappos says with the implementation of the America Invents Act well underway businesses in industries highly reliant on intellectual property, such as IT, can look forward to expedited reviews of their By Kenneth Corbin Jun 21, 2012 5 mins Government Intellectual Property Technology Industry news Google Project Aims to Document Endangered Languages Google has cooperated with universities and linguistic organizations to begin documenting approximately 3,500 languages that are at risk of disappearing in the next 100 years, the company said on Thursday. By Loek Essers Jun 21, 2012 2 mins Internet news Researcher: Face.com iOS flaw could have allowed Facebook, Twitter account hijacking Face.com patched a vulnerability that could have allowed attackers to hijack the Facebook and Twitter accounts of its customers By Lucian Constantin Jun 21, 2012 2 mins Mobile Security Privacy Social Networking Apps news Apple Infringes on Samsung UMTS Patent, Dutch Court Rules Samsung lost two other infringement cases in The Hague today By Loek Essers Jun 20, 2012 4 mins Mobile Small and Medium Business news Ipad Customers Felt “short Changed” By Apple, Australian Judge Says An Australian judge approved a A$2.25 fine against Apple for misleading 4G claims By Jeremy Kirk Jun 20, 2012 2 mins Computers and Peripherals Legal Regulation news Surface vs. iPad: The Weight of the World on Microsoft Will Steve Ballmer risk it all in his quest to unmake the iPad? He has a chance, but Microsoft advertising must first forge a relentless attack on the iPad's weaknesses. By Tom Kaneshige Jun 20, 2012 5 mins Laptops Microsoft Office Office Suites news Unpatched Microsoft XML Core Services Flaw Increasingly Targeted in Attacks, Researchers Say Sophos discovers new compromised websites that exploit the CVE-2012-1889 MSXML vulnerability By Lucian Constantin Jun 20, 2012 2 mins Intrusion Detection Software Security news House Panel Condemns U.N. Internet Regulatory Plan In unanimous vote hailed by tech industry groups, committee members call on the Obama administration to resist efforts to empower United Nations with global Internet oversight authority in negotiations later this year. By Kenneth Corbin Jun 20, 2012 5 mins Government Regulation news Google “Surprised” by Revived U.K. Street View Investigation Google is "surprised" that the U.K. Information Commissioner's Office (ICO) reopened its investigation into the way the company's Street View cars gathered personal data from unencrypted Wi-Fi networks, the company said in a lette By Loek Essers Jun 20, 2012 3 mins Internet Legal Regulation news 5 Pros and Cons of Microsoft Surface Tablet The Microsoft Surface and Surface Pro tablets seem to strike a nice balance between work and play. However, Microsoft will need more than a built-in keyboard to woo iPad users. Oh, and then there's the risk that the device is a slap in the face By Jonathan Hassell Jun 20, 2012 7 mins Laptops Small and Medium Business Ultrabook news Report: Flame Part of US-Israeli Cyberattack Campaign Against Iran Unnamed Western officials confirmed that Flame was developed by US and Israeli governments, the Washington Post reported By Lucian Constantin Jun 20, 2012 2 mins Government Intrusion Detection Software news Researchers Set New Cryptanalysis World Record for Pairing-based Cryptography Researchers from Fujitsu Laboratories, Japan's National Institute of Information and Communications Technology (NICT) and Kyushu University have set a new cryptanalysis world record by cracking a 278-digit-long (923-bit) key used in a pairing-ba By Lucian Constantin Jun 19, 2012 2 mins Encryption news Fake Android Antivirus App Likely Linked to Zeus Banking Trojan, Researchers Say Cybercriminals are distributing a mobile component of the Zeus banking Trojan as an Android security application, Kaspersky experts said By Lucian Constantin Jun 19, 2012 3 mins Fraud Intrusion Detection Software Mobile Security news Cloud Failures Cost More Than $70 Million Since 2007, Researchers Estimate The figures of the economic impact of cloud outages is probably underestimated, the researchers said. By Loek Essers Jun 19, 2012 3 mins Cloud Computing Enterprise Applications news Data Breach? Virtual Bounty Hunters Will Hunt it Down The security company CloudeyeZ is taking a new approach to helping companies manage data breaches By Jeremy Kirk Jun 19, 2012 3 mins Security news Data in Possible Credit Card Breach Appears to Be Old The data, linked to from Pastebin, includes, names, addresses and emails By Jeremy Kirk Jun 18, 2012 3 mins Security news Attack Code Published for Two Actively Exploited Vulnerabilities in Microsoft Software Exploit modules for the CVE-2012-1875 and CVE-2012-1889 vulnerabilities were added to the Metasploit framework By Lucian Constantin Jun 18, 2012 2 mins Patch Management Software Security news Governments Should Invest More in Catching Cybercriminals, Researchers Say Investing in law enforcement action against cybercriminals is more important than buying cybersecurity software, researchers say By Lucian Constantin Jun 18, 2012 4 mins Cybercrime Government IT Security news Mozilla’s Concept Ipad Browser Eliminates the URL Bar, Tabbed Browsing Tablet browsing should be simple and fun and not feel like work, Mozilla developers said. By Loek Essers Jun 18, 2012 3 mins Browsers Developer news UK Attorney Says US Won’t Extradite Lulzsec Defendant Ryan Cleary's attorney said her client suffers from Asperger's syndrome and that extradition would be 'totally undesirable' By Jeremy Kirk Jun 17, 2012 2 mins Cybercrime Data Breach Data and Information Security news analysis Why Your IT Outsourcing RFP Is Holding You Back The traditional request-for-proposal (RFP) process may be doing your IT outsourcing relationships a disservice. Enter request for solutions (or RFS), an open-ended, collaborative approach that's better for IT environments. By Stephanie Overby Jun 15, 2012 6 mins IT Leadership IT Strategy Outsourcing news VMware Patches Arbitrary Code Execution Flaw in Desktop, Server Virtualization Products Loading specially crafted virtual machine checkpoint files can result in the host system being compromised By Lucian Constantin Jun 15, 2012 2 mins Desktop Virtualization Patch Management Software Server Virtualization news Siri’s Steep (and Long) Learning Curve Siri, the iPhone's voice-enabled personal assistant, has a big problem: It doesn't really work the way Apple says it does. By Tom Kaneshige Jun 15, 2012 4 mins Car Tech Innovation iPhone news Will Windows 8 Be the Client OS That IT Loves Best? Speakers at Microsoft TechEd touted the virtues of the upcoming Windows 8. No surprise there — except the speakers were using Windows 8 on tablets, with nary a desktop in sight. Will the strength of Windows 8 on tablets finally get IT and end user By Rob Enderle Jun 15, 2012 5 mins Microsoft Office Mobile Security Small and Medium Business news 10 Trends Driving Big Data in Financial Services When it comes to Big Data, the financial services sector has been somewhat slow on the uptake. Neil Palmer, partner of SunGard Consulting Services' Advanced Technology Business, explains it as a cautious approach to innovation driven by the heav By Thor Olavsrud Jun 14, 2012 3 mins Analytics Big Data Business Intelligence news 64-bit Operating Systems, Virtualization Software Vulnerable to Privilege Escalation Attacks on Intel CPUs Attackers can exploit an Intel CPU-dependent vulnerability to escape virtual machines or gain kernel privileges By Lucian Constantin Jun 14, 2012 2 mins Desktop Virtualization Patch Management Software Small and Medium Business news Alleged Lulzsec Member, Ryan Cleary, Indicted in U.s. Cleary, already charged in the U.K., is accused of attacking Sony Pictures and Fox Entertainment By Jeremy Kirk Jun 14, 2012 3 mins Cybercrime Legal Security news Tech Logos: The Stories Behind the Designs When Twitter tweaked its blue bird, the design world was atwitter (pun intended). We spoke with Silicon Valley graphic designer Steve Yamaguma of Design2Market to get his insights into a few familiar tech logos. More goes into design than most people By Tom Kaneshige Jun 13, 2012 7 mins Facebook IT Strategy Twitter news How the U.S Can Avoid a ‘Cyber Cold War’ Former White House Cybersecurity Chief Howard Schmidt discusses the challenges of combating cyber threats on a global scale and efforts currently in play towards cybersecurity legislation on the domestic front. By Kenneth Corbin Jun 13, 2012 5 mins Cybercrime Government Regulation news Windows To Go: The Do’s and Don’ts New Windows 8 enterprise feature, Windows To Go, allows you to boot up a real version of Windows 8 on any PC running Windows 7 or higher using a USB thumb drive. Here's what else you need to know. By Shane O'Neill Jun 13, 2012 4 mins Encryption Laptops Small and Medium Business news What Not to Like About Apple’s New MacBook Pro, iOS Maps App Is the non-upgradeable new MacBook Pro too expensive? If Apple stumbles with its new Maps App, will customers jump to Android? Mac Pro users ask: Apple, why hast thou forsaken me? CIO.com has a busy WWDC covered. By Tom Kaneshige Jun 13, 2012 4 mins Computers and Peripherals MacBook iPhone news Exploit Available for Root-access Vulnerability in F5 Networks Products Hackers can use a leaked SSH key to obtain root access on many F5 networking appliances By Lucian Constantin Jun 13, 2012 2 mins Computers and Peripherals Networking Patch Management Software news 3 Things You Need to Know About How LinkedIn’s Calendar Works Reports last week revealed that LinkedIn collects meeting information –including phone numbers and sensitive meeting notes — if you turn on the iOS app's calendar feature. LinkedIn sets the record straight, making three important clarification By Kristin Burnham Jun 13, 2012 3 mins Data Breach Data and Information Security LinkedIn news Merchant Information May have Been Stolen From Global Payments Hackers had access to servers hosting personal information of merchant applicants, Global Payments said By Lucian Constantin Jun 13, 2012 2 mins Data Breach Security 1…585960616263646566…297 Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by Fivetran You’re not ready for agentic AI By Taylor Brown, COO and Co-founder of FivetranOct 2, 20255 mins Artificial Intelligence news Salesforce Trusted AI Foundation seeks to power the agentic enterprise By Thor OlavsrudOct 2, 20254 mins Artificial IntelligenceEnterprise ApplicationsSalesforce.com opinion Why CIOs must be business leaders first, technologists second By Nazih BattalOct 2, 20256 mins IT LeadershipStaff Management podcast TruStone tech execs share AI-driven credit union transformation Oct 1, 202522 mins CIO Leadership Live podcast The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live podcast Why AI upskilling fails, and how tech leaders are fixing it | What IT Leaders Want, Ep. 11 Sep 12, 202528 mins CareersGenerative AI video TruStone tech execs share AI-driven credit union transformation Oct 1, 202522 mins CIO Leadership Live video How BeyondTrust detects privilege escalation and dark web threats Oct 1, 202511 mins Identity and Access ManagementNetwork SecurityZero Trust video The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live