A look ahead at the state of the database in 2016
With security breaches and controversies over encryption, thinking about securing the data inside organizations is in the spotlight. How best to store and manage data is on the minds of most CIOs as they head further into the New Year.
Here’s what to watch for in 2016
Intel Skylake-based PCs freeze during complex workloads
A bug in Intel’s Skylake architecture was discovered by a team of mathematicians called the Mersenne Community. The group has been using Intel systems to search for prime numbers for the past 20 years and had yet to encounter any problems until now.
According to the Mersenne community, they experienced system freezes while running GIMPS (Great Internet Mersenne Prime Search) Prime95 software. By employing tens of thousands of machines to run hand-coded assembly language 24 hours a day, this group has found all of the record prime numbers during the last 20 years.
The pros and cons of implementing a bug bounty program
A recent incident with the Facebook Bug Bounty program has led to many different reactions supporting both Facebook and the security researcher. Regardless of who is right in that whole story, the one fact is clear: the researcher went far beyond what the social media site had initially expected, and got access to the sensitive data the company didn’t really want to share with anybody, including the researchers’ community.
These days bug bounties have become very popular, raising more and more questions about their efficiency and effectiveness. We will try to understand how and if bug bounties can be used to test your corporate web applications. I intentionally omit bug bounties for stand-alone software (e.g. Chrome or various IoT applications) as it’s a different topic.
How to scale your DevOps efforts
All companies -- from retail, to media, to IoT -- are increasingly becoming software companies. Data loss, security threats, service downtime and performance issues can sink a business. As a result, DevOps has evolved from an island of marginalized system administrators to an organization-wide cultural shift.
Companies like Netflix, Ticketmaster and Etsy understand that DevOps entails established processes, interconnected systems for monitoring and diagnosing, and org-wide vigilance about incident response. As our businesses continue to become more software-driven, Heavybit’s community of developer-focused entrepreneurs, advisors and investors provide tips and tactics to scale your DevOps efforts:
Should your business build a mobile app?
You are thinking about having an app built to help grow your business. After all, the biggest and the best all have apps, so should you, right? Ideally, you do need an app for your business.
In fact, a recent study published by the Gallup Poll reports that 52 percent of the population checks its smart phones several times per hour, and of the remaining 48 percent, 20 percent of the people claim to check their phones once per hour. These numbers are a marketing team’s dream! So many easy to reach people in one place! So yes, you need an app!
Security trends to watch in 2016
2015 was a year for the record books in information and cyber security. Dozens of new vulnerabilities were uncovered, and government organizations, businesses and individuals continued to find themselves victims of high-profile data breaches.
As we settle into the new year, we don’t expect this trend to slow down. We foresee more security issues on the horizon that must be addressed in order to ensure privacy for companies and consumers in the year ahead. Here are our predictions on what’s coming in 2016:
Leverage geographically-distributed development
Geographically-distributed development, or GDD, has made a name for itself as an extremely-effective IT strategy model within global enterprises throughout the world. As a highly-advanced support tool, GDD replaces archaic methods of managing development projects that compromise a business’ operational goals and success.
Conversely, GDD establishes optimized communication, efficiency, cohesiveness and success potential within an enterprise. Because GDD is extremely accommodating as a support tool, businesses from one part of the world to the next can quickly respond to business changes as they occur.
Penclic R3: Not your typical mouse [Review]
Using a mouse for long periods can be uncomfortable and in severe cases may even lead to repetitive strain injury.
There are various pieces of kit on the market to help you avoid this including ergonomically designed mice and wrist rests. Taking a slightly different and more innovative approach to the problem is the Penclic which is a sort of fusion of mouse and pen.
Dell expands Latitude lineup with new laptops and hybrid devices
Dell has announced an expanded lineup of Latitude laptops, 2-in-1 devices and monitors at CES 2016 in Las Vegas. The new Latitude products are: Latitude 13 7000, Latitude 12 7000 and Latitude 11 5000.
The Latitude 3000, 5000 and 7000 Series have been completely refreshed with thin and light designs, excellent efficiency and powerful processing options.
Microsoft Intune update will improve Windows 10 support
Microsoft will release a service update to its Intune management software within the next week, introducing a number of new features and enhancements.
A large part of the update will be dedicated to Windows 10 support, ensuring that Intune is optimized for a number of features native to Microsoft’s new operating system.
Microsoft and Rambus team up for quantum computing research
Researchers at Microsoft are partnering with Rambus in order to evaluate the future memory requirements of quantum computing.
The two technology firms will share their resources and expertise in order to determine the types of computer architecture that will provide the biggest improvement to memory capabilities and overall system performance. Gary Bronner, vice president of Rambus Labs said that existing architectures are struggling to meet the increasing demands of real-time data consumption.
BlackBerry will only release Android devices in 2016
BlackBerry has heralded the new year with a new move -- that is, to shift to Android for its upcoming devices in 2016.
In BlackBerry’s statement, company CEO John Chen said that its BB10 operating system will take a back seat this year as the company intends to launch two Android-powered devices to accompany the BlackBerry Priv.
Intel Security and AirWatch team up to boost mobile protection
Intel Security has expanded its partnership with VMWare’s enterprise mobility subsidiary AirWatch, placing a greater emphasis on mobile security initiatives.
The two companies aim to help organizations cope with the numerous security issues posed by mobile devices, as well as integrating enterprise protection across PCs, operating systems, networks and the cloud.
Hybrid IT systems hinder innovation
Research from Sungard Availability Services, a provider of information availability through managed IT, cloud and recovery services, has revealed a dark side to hybrid IT systems.
Sungard’s findings based on a study which questioned 150 senior IT decision makers in UK organizations with more than 500 employees with an average IT spend of around £36m per year, found that over half of UK organizations believe that the complexity of their IT environment is hindering their ability to innovate.
Finding the right balance between business security and employee productivity
Don’t you wish you could give your users all the access they need, without worrying about them becoming frustrated with the increased security measures put on the business and then taking actions into their own hands to avoid those security measures in order to remain productive? Simply providing users with IDs and passwords for each application or data set will not keep your business secure…or productive... anymore. A truly successful security strategy must look at information in context, exploring the "who, what, when, where, and why" of access activities. Your strategy must understand where gaps exist, while supporting secure and convenient access to both legacy and emerging applications for users -- who expect to stay productive -- and the IT staff responsible for keeping the business secure.
The theory behind security is noble: IT should ensure that only approved users can access systems and data, that they access them only for the right reasons, and that they’re doing the right things once they’ve gained access. In practice, though, security has been a static process of IT administrators saying "no", denying access and placing barriers (multiple passwords and access protocols) between users and the resources they need to do their jobs.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.