The Internet of Things (IoT) is not some future concept, nor is it just around the corner; it has been here for some time, and it’s growing. Fueled by the expansion of wireless and cloud computing technology, more things are now connected to the internet than people. That’s all people, not just people on the internet.
What are these “things” which make up the Internet of Things? The IoT is not limited to smartphones and tablets, laptops and desktops. Every year, more and more devices are released capable of internet access, exponentially expanding the universe of internet of things devices.
Heart monitors and insulin pumps generate real-time data available to healthcare professionals caring for patients. Cattle ranchers can monitor cows in the field, not only pinpointing their location, but also identifying those who are pregnant. Power stations, remote pumps feeding oil and gas lines, and even entire assembly lines can now be accessed, monitored and controlled as part of the Internet of Things.
According to the latest research from government cloud provider Eduserv, a lack of awareness and skills around cloud computing is halting its adoption in central government. Continue reading “Skills gap hindering government cloud computing adoption, survey finds”
Konduit customers may have heard about the Heartbleed vulnerability in OpenSSL. Customers using Konduit’s SECURE Transaction Editor service can be assured that their systems are safe from the Heartbleed bug. Transaction Editor runs on the Windows operating system and uses Microsoft Internet Information Service (IIS) which comes with its own SSL encryption component called Secure Channel (i.e. SChannel), which is NOT susceptible to the Heartbleed vulnerability. All versions of Windows operating systems and IIS up to and including IIS 8.5 use SChannel.
This is a pretty common practice—if you don’t do it, you probably know someone who does—but PC World says it has some definite downsides:
Most important of all, files on the desktop are not as well protected as files in libraries like My Documents and My Pictures.
For instance, if you use System Restore to return Windows to its state as of last Wednesday, the feature will remove any files added to the desktop since that date. The files in My Documents will be left untouched.
What’s more, many file-based backup programs don’t, by default, back up the desktop. You can change that, of course, somewhere in your backup program’s settings. Read the whole article at LifeHacker.com
Almost every meeting held today at Google makes use of the Hangout program to accommodate employees unable to attend, or who work in other locations.
Despite having technology that so powerfully and conveniently unites people–and that their own company created–Google’s founders and top executives have intentionally retained one old school element of leadership communication. Once a week, they make themselves available, live and in person, to Google headquarter employees (interactively beamed live to all other locations) in town hall meetings. Read more at Fast Company…
More and more small businesses are outsourcing their software development projects. There are some great advantages of outsourcing your software development needs.
Continue reading “Business Software Development: Outsource Advantages”
Chris Hadnagy, scams security expert, presents an overview of the newest kind of cyber scam. This new type of scam, called social engineering, mines personal data via social media.
Continue reading “A New Kind of Cyber Attack”