Subscribe to Wired Magazine
  • Image: Katchooo/Flickr
  • How to Keep Cloud Projects on Track

  • Monday, December 24
  • Comments (4)
  • Despite the many terabytes worth of words that have been written extolling the virtues of cloud computing, even the most forward-thinking organizations face an obstacle course in getting cloud projects off the ground. The problem is that deploying enabling technologies …

  • Image: Images_of_Money/Flickr
  • Christmas in the Cloud: The PCI Edition

  • Monday, December 24
  • Discuss
  • We like to shop only at the best establishments. And we like to think that our payment information is definitely secure, especially around the holiday season when we are all stressed enough by the expenditure, the weather and the family. …

  • Image: IntelFreePress/Flickr
  • The Commoditization of the Smartphone

  • Friday, December 21
  • Comments (7)
  • Smartphones have seen a tremendous growth on their popularity ever since the introduction of Apple’s iPhone in T-Mobile’s network sometime back in 2007. The release of Google’s Android also did influence this growth in a very positive way. Android provided …

  • Image: CJ Schmit/Flickr
  • The 5 Essentials of DDoS Mitigation

  • Thursday, December 20
  • Discuss
  • Distributed Denial of Service (DDoS) attacks are a real threat businesses and organizations deal with daily, but this does not mean they have to endure the slashes of service or slow downs attacks bring on. Organizations do not have to …

  • Image: KJGarbutt/Flickr
  • Holiday Travel: The Gift of Biometrics

  • Wednesday, December 19
  • Comments (10)
  • Crooner Andy Williams says this is supposed to be “the most wonderful time of the year.” But, for many, the holidays mean dealing with the frustration of air travel — the crowds, the lines, the security and scanning, and then …

  • Image: Apple
  • How the iPad Mini is Impacting the Enterprise

  • Tuesday, December 18
  • Comments (15)
  • The iPad mini will further stimulate a transition from the employee-led deployment approach to an enterprise-led approach, where the enterprise seeks to gain the maximum possible efficiency by support tablets or where the tablet is a central part of the …

  • Image: Gary Lerude/Flickr
  • Mobile First: The Next Big Build-Out

  • Monday, December 17
  • Discuss
  • If 2012 was the year of the mobile consumer than 2013 looks to be the year of the mobile enterprise. Businesses large and small are embracing “bring your own device” (BYOD) and increasingly enabling employees to leverage their personal devices …

  • Image: ajleon/Flickr
  • COPE: The Secure Alternative to BYOD

  • Friday, December 14
  • Discuss
  • Everyone is talking about BYOD (bring-your-own-device), with most people finding that security is the biggest issue with BYOD programs. As the BYOD conversation begins to dwindle, the discussion will turn to the next wave in mobile trends: COPE (corporate owned, …

  • Peace out. Image: Randy Son Of Robert/Flickr
  • CIOs vs. Rogue Developers: How Private PaaS Keeps the Peace

  • Thursday, December 13
  • Comments (5)
  • We are addicted to instant gratification. Everything from on-demand movies to music-streaming to instant messages has heightened people’s sense of urgency. We wanteverything right now. Application developers are no exception. They have little patience for slow-moving bureaucracy, protocols, resource constraints, …

  • Image: NASA
  • Use the Cloud to Speed Emergency Response Time

  • Thursday, December 13
  • Discuss
  • Hurricane Sandy restarted the conversation about emergency preparedness in the public forum, but safety and security directors around the world perpetually consider how to best prepare their institutions for the hour of disaster. Many are finding that cloud-based solutions enhance …

  • Image: d.boyd/Flickr
  • Should You Virtualize Your Pattern or Not?

  • Tuesday, December 11
  • Discuss
  • In most IaaS cloud computing environments, the unit of deployment is the image that gets deployed (or runs) on a virtual machine.  Each image typically comprises operating system software, dependencies, libraries, and utilities, and also the application middleware and software.  …

ElsewhereWhat we’re reading
  • gigaom.com
  • What we'll see in 2013 in data

  • Everyone’s talking about the greatness of big data, but we’re nowhere near the promised land of what’s possible when we turn data loose on our lives. Here are three things to watch that could affect how companies and everday people ...  More
  • Tuesday, December 18
  • Discuss
  • wired.com
  • HP Spying Scandal Ends With a Whimper

  • The HP boardroom spying scandal once transfixed the national media. It sparked Congressional hearings and lawsuits, and it changed the law. But it ended on Thursday in a mostly empty San Jose, California courtroom with a three-month conviction for Bryan ...  More
  • Friday, December 14
  • Discuss
  • gigaom.com
  • What we'll see in 2013 in mobile

  • Another year has come and gone with more mobile advances than ever before. What’s in store for the year ahead? Our mobile staff looks a five trends that are likely to affect hardware, software and services in the fast growing ...  More
  • Thursday, December 13
  • Discuss
  • wired.com
  • Mr. Zuckerberg, Tear Down This Wall

  • If history is a guide, even companies as mighty as Facebook and Twitter can be quickly displaced by a set of scrappy newcomers, born from disgruntled former users. Hacking together new software to take on Facebook doesn’t sound particularly fun. ...  More
  • Wednesday, December 12
  • Discuss