Tag: IT

IE9 Best at Catching Malware?

IE9 Best at Catching Malware?

A recent study by NSS Labs suggests that Internet Explorer 9 trumps competing browsers when it comes to preventing web-based malware attacks. The study, which you can read in full here, also looked into the blocking abilities of Firefox, Safari, Opera, and Chrome. The report, which tested browsers against socially engineered threats such as fake […]

Read the full article.

Punch cards, transistors, and B code: paying homage to computer lab forefathers

Punch cards, transistors, and B code: paying homage to computer lab forefathers

We’ve come a long way from room-sized computers and binary punch cards, but the concepts developed in early- and mid-20th century labs are the foundation for how we innovate today. An article on Extreme Tech gives the lowdown on the top seven computer labs that contributed to the development of the digital age. While many […]

Read the full article.

Green screens: energy-collecting LCDs coming soon

Green screens: energy-collecting LCDs coming soon

Your smart phone, iPad, or other LCD device may soon be able to recharge using solar energy. The colorful, high resolution LCDs on smart phones and other devices consume a lot of energy and quickly drain battery life; however, engineers at UCLA are developing one alternative. The engineers have created photovoltaic polarizers that sit over […]

Read the full article.

Web malware detection increasingly difficult

Web malware detection increasingly difficult

Google recently published a report based on its research into identifying malicious websites. The company routinely flags malicious websites as part of its attempts to warn search engine users of potential dangers, but this report suggests that hackers are using new methods to avoid flagging. Many methods exist to discover malware, and the report dissects […]

Read the full article.

Windows 8 Cloud Strategy – Will it prevent piracy or alienate users?

Windows 8 Cloud Strategy – Will it prevent piracy or alienate users?

In its next OS launch, Microsoft is likely taking advantage of cloud technology to stymie attempts at piracy. Windows 8 will not only change from product keys checked against a simple .txt file on the install disk; online authentication will be mandatory. Part of the operating system might not even be available until the OS […]

Read the full article.

Mozilla joins the mobile OS party

Amidst competitors such as Google’s Chrome OS, Apple’s iOS, Microsoft’s Windows Phone 7, and various flavors of Linux, Mozilla is diving into the mobile OS market with its Boot to Gecko or “B2G” operating system.  Designed for quick booting, ease of taking your settings with you across devices, and optimized for web browsing, mobile operating […]

Read the full article.

Migration from Exchange to Google Apps Frustrating, Satisfying

Migration from Exchange to Google Apps Frustrating, Satisfying

Paul Venezia, writing in Network World, details some of the decision making issues, human factors, and potential outcomes of a corporate switch from an Exchange-based solution to Google’s cloud-based system.  Financially, the process was a success; however, it was not an easy transfer due to Google’s lack of support and need for an in-depth understanding of […]

Read the full article.

Security is not an option

Security is not an option

In light of a recent multitude of security failures, service provider security is a hot topic.  While many companies purport to have excellent security features, many of these features are hidden behind “opt-in” dialogues and fees.  HTTPS encryption is an oft-used method of protecting network data, but many websites do not encrypt data.  Encryption is […]

Read the full article.

IT Projected to have greatest impact on Healthcare Worker Shortage

IT Projected to have greatest impact on Healthcare Worker Shortage

A recent survey at ASQ of 475 healthcare professionals revealed the greatest burden is to be felt by Primary Care Physicians and Nurses, when staffing shortages worsen in 2014 as the healthcare reform law kicks in and more baby-boomers become Medicare-aged.  Healthcare IT systems (especially Electronic Medical Records (EMRs) were viewed as key to prevent […]

Read the full article.

Enterprise Mac networks face crippling exploits

Enterprise Mac networks face crippling exploits

Mac OS has had a veneer of invulnerability for quite a while, and new releases such as OS X Lion have improved security features. Many users do not even bother to install anti-malware software on their Macs. Whether OS X is truly a more secure operating system than its competitors is in question, however. At […]

Read the full article.