Google+ Noticeably Absent at Google I/O
Google didn't just ignore its social network at its developer conference this week, writes CIO.com's Matt Kapko. It's already acting as if Google+ doesn't exist at all.
Google didn't just ignore its social network at its developer conference this week, writes CIO.com's Matt Kapko. It's already acting as if Google+ doesn't exist at all.
Most of the time, software developers do the right thing. On those rare occasions when they don't, bad things can happen. Avoiding these common coding practices will make your work easier -- and your software more secure and scalable to boot.
The social bulletin board can produce consumer buzz and website traffic, but needs better analytics for businesses.
Google says it's in the enterprise Cloud market to stay.
The security of open source software relies on the community spotting errors -- but Heartbleed and other recent events suggest that that's not happening.
It can be hard for women at the top of the corporate ladder to really drive change. (Its a challenge for men, too.) Moderating a panel at the recent Women in Technology Summit, though, CIO.com columnist Rob Enderle discovered that women outside the C-suite are driving change at many technology companies. Credit a willingness to embrace analytics.
Talk to IT personnel, or study what they look up on Google, and you may think they're done with cloud computing. Talk to analysts or more importantly, end users, and you'll hear a different story.
Commingling internal and external data can produce problems if your contract isn't clear about who owns what -- and for how long.
An online supply chain platform helps Wolverine Worldwide integrate a major acquisition and become more agile
The IBM Edge2014 infrastructure event hinted at how the company plans to use experience to its advantage. Far from burning out or fading away like an aging rock star, IBM intends to join today's young rockers on stage -- and steal the show.
Webroot today released the results of a survey on BYOD that suggests the employee-employer trust gap is widening. The company also created an eight-point "BYOD Bill of Rights" to help bridge that gap while keeping corporate data secure.
Businesses still struggle to hone in on the most appropriate social metrics. Far too many firms emphasize vanity metrics when there remains little agreement over the true value of a follower, friend, retweet, reblog, pin or like.
Verizon, AT&T, Sprint and T-Mobile, and their associated 911 call centers, now accept emergency SMS text messages, but the new functionality is currently available only in limited areas in 16 states.
Network and boundary security are more important than ever for organizations of all sizes. A variety of security specialist firms now offer leading-edge virtual and physical devices for Unified Threat Management (UTM) to raise the security bar ever higher and respond proactively to zero-day threats.
An estimated 1,500 developers gathered last week at F8, Facebook's first conference in almost three years, to learn about the latest updates to social network's platform. The atmosphere throughout the event was that of a very grown-up and increasingly serious business.