Microsoft explains Windows as a SERVICE – but one version remains a distant dream

All users on the same version? Not in our lifetime, chum Windows chief Terry Myerson proclaimed the advent of Windows-as-a-service at an event last month. But what does that mean? A more recent post from Enterprise and Security Directory Jim Alkove offers some clues.…

IBM Launches Cloud-Based Enterprise-Wide Analytics for Energy Companies

IBM has launched Insights Foundation for Energy, a cloud-based energy analytics, data management and visualization software platform for energy and utility companies. The platform can be used to get a 360-degree view from the individual transformer level to the entire grid. Securely delivered via the SoftLayer infrastructure from IBM, the Insights Foundation for Energy couples   ...Continue Reading
The post IBM Launches Cloud-Based Enterprise-Wide Analytics for Energy Companies appeared first on Energy Manager Today.

After TurboTax Fraud Fears, Is Free Tax Software Safe? A Viewpoint

Last Updated 9th February, 2015Intuit/TurboTax, one of the tax industry giants, suffered a black eye recently when they were forced to stop e-filing state tax returns for a period of time while they investigated a potential data breach.   They’ve since resumed e-filing of state returns and TurboTax announced there doesn’t appear to be breach of customers’ […]

Google acquires photo backup and sharing app Odysee

Google has acquired the talent and technology behind Odysee, a cross-platform photo backup and sharing app. The move could be in preparation for the rumored separation of the Web giant's Photos product from its Google+ social platform. The post Google acquires photo backup and sharing app Odysee appeared first on Digital Trends.

How secure is Android? And should we be worried? [Q&A]

In the past malware developers and hackers have tended to concentrate on Windows. But as mobile has taken off and there's been a shift in the type of systems people use they've diversified their efforts into other systems. In particular Android, as the most popular mobile OS, has become a prime target. We spoke to Ren Huan, chief architect at Android security and performance specialist 360 Security to get his view of the mobile security landscape. BN: How does the Android threat landscape differ from other operating systems? Are premium SMS threats still a major problem for example?

Leverage the Full Spectrum of Customers’ Mobile Activities in 6 Steps

A great mobile app is like a gold nugget, but it’s only one among many. For your mobile marketing to reach the widest possible audience, you must go beyond the app and leverage the full spectrum of mobile activities.
The post Leverage the Full Spectrum of Customers’ Mobile Activities in 6 Steps appeared first on Digital Marketing Blog by Adobe.

Pages