jfruh writes: Samsung is one of South Korea's most prominent companies on the international tech scene. But it's looking for mobile innovation in a surprising place: The United States. The company is starting incubator spaces in Palo Alto and Manhattan aimed at cultivating startups working on software and services for phones, tablet computers and televisions. The hope is that Samsung will be able to cut deals with these companies and keep its tight grip on the Android market.
itwbennett writes: The trend among CIOs to be seen as business strategists, and not technologists, is 'finding its way down the IT food chain and to all lower organizational levels,' writes IT management consultant Eric Bloom. This effect is most noticeable in IT hiring, where, says Bloom, for jobs from business analyst to software tester, if you don't have specific industry knowledge, you need not apply. And the reason you need this knowledge may have less to do with the job you are applying for than to bolster the CIO's business cred.
itwbennett writes: You can make a decent living as a software developer, and if you were lucky enough to get hired at a pre-IPO tech phenom, you can even get rich at it. But set your sights above the average and below Scrooge McDuck and you won't find many developers in that salary range. In fact, the number of developers earning $200,000 and above is under 10%, writes blogger Phil Johnson who looked at salary data from Glassdoor, Salary.com and the Bureau of Labor Statistics. How does your salary rate? What's your advice for earning the big bucks?
jfruh writes: The average advanced attack on a computer system results in the attacker having access to the compromised machine for nearly eight months. Your security plan needs to determine not just how to keep bad guys out but how to detect and repulse those who get in. Sandra Henry-Stocker outlines the steps you need to make sure an attacker's stay on your Unix machine is short and unproductive.
itwbennett writes: Next month, Intel will be rolling out Haswell for servers. But where the desktop message was clear and necessary, the server message is a little more complicated and very different, says blogger Andy Patrizio. It will be interesting to see how Intel plans to sell these chips that are only a shade faster than their Ivy Bridge predecessors. The answer, may lie in Haswell's improved graphics performance: 'According to Cisco, Internet video/TV/VoD and other video traffic will account for 80% to 90% of Internet traffic by 2017. Besides the fact that's a downright scary stat, something has to process all that video, and Haswell is far better equipped than any prior generation of Xeons to handle it.'
itwbennett writes: 'Find My iPhone' is neat, but it's time for smartphone makers and carriers to stop pretending their anti-theft measures are anything more than minimum viable products, says blogger Kevin Purdy. He's not the first to point this out: As reported in Slashdot, 'NYC Mayor Michael Bloomberg said overall crime in New York City was up 3.3% in 2012 due to iPhone, iPad and other Apple device thefts.' And now San Francisco and New York attorneys general are calling a 'Smartphone Summit' where representatives from Apple, Google, Samsung, and Microsoft are due to meet and discuss the implementation of a industry-wide 'kill switch' system.
Lucas123 writes: As consumerization of IT and self-service trends becomes part and parcel of everyone's work in the enterprise, the corporate data center may be left behind and IT departments may be broken up and technologists given over to business units as consultants and integrators. "The business itself will be the IT department. [Technologists] will simply be the enabler," said Brandon Porco, chief technologist & solutions architect at Northrop Grumman. Porco was part of a four-person panel of technologists who participated at a town hall-style meeting at the CITE Conference and Expo in San Francisco this week. The panel was united on the topic of the future of IT shops. Others said they are not sure how to address a growing generation gap between young and veteran workers, each of whom are comfortable with different technologies. Nathan McBride, vice president of IT & chief cloud architect at AMAG Pharmaceuticals, said he's often forced to deal with older IT workers coming on board who expect his company to support traditional email like Outlook when it uses Google Apps.
hypnosec writes: Microsoft has successfully taken down Citadel botnet in collaboration with the FBI which was known to control millions of PCs across the globe and was allegedly involved in and responsible for bank fraud in tune of more than $500 million. Citadel was known to have over 1,400 instances across the globe with most of the instances located in the US, Europe, India, China, Hong Kong and Singapore. The botnet a malware by the same name and this malware once on a system was used to install key-logging tools on target systems, which were then used to steal online banking credentials.
jfruh writes: Did you buy an Acer laptop with Vista and less than 1 GB of RAM? The company has a thumb drive it would like to send you. Did you get an unwanted text from Papa John's? The company would like to make it up with you with $50 worth of free pizza. These and other little rewards are available as a result of class action lawsuits that have wound their ways through the court systems and now, years later, are paying off for very large groups of tech users.
itwbennett writes: The best programming fonts, it’s generally agreed, should, among other things, be monospaced (for code alignment), sans-serif, readable at a small size and clearly distinguish between certain common characters (e.g., zero from the letter O, lower case L from the number 1). Here are some of the most popular over the last 20+ years.
jfruh writes: SoftLayer is a cloud services firm that was just scooped up for big money by IBM, who had to fight off bids from EMC and AT&T to get it. Why was Big Blue willing to pay so much for a fairly anonymous company? Well, it's moving into the cloud realm in a way that still allows customers to run their apps on bare metal. Oh, and it's already pretty profitable.
itwbennett writes: The U.S. International Trade Commission (ITC) said in a final judgment released Tuesday that Apple infringed a patent involving 3G wireless technology used to transmit multiple services simultaneously and is necessary for device interoperability. The import ban affects AT&T models of the iPhone 4, iPhone 3GS, iPad 3G and iPad 2 3G. The ITC also went a step further, issuing a cease-and-desist order so that Apple is forbidden from selling any inventory of those iPhones and iPads that it has already imported into the U.S. after the exclusion rder takes effect. The order now goes to President Obama for review.
itwbennett writes: While Bateman is technically still an 'undeclared humanities' major, the former Family Ties star, now a college freshman, is intent on switching her major to computer science. She's posted bits of her code on her Tumblr so you can check on her progress. But she must be doing something right: she's scored a summer internship at Symantec.
jfruh writes: Intel is making some pretty bold claims for the Haswell chips it's rolling out today — among them, that they'll cut power consumption in Haswell-based ultrabooks by 50%. Is this even possible? Chip blogger Andy Patrizio says yes, sort of — though it requires an expert rearchitecting of the entire PC motherboard, along with some tricks like dimming the screen whenever possible
itwbennett writes: If you've ever worked on a team you can probably recall a time when, as a group, you produced work that was not as good as any one of you could have done on your own. Sarah Mei had this sort of sub-par teamwork experience, which she shared in her session at the O'Reilly Fluent Conference this week. Mei 'spoke about a time she worked on a team with really expert developers. Every one of them was someone whom you'd admire, who had previous written code that you and I would boast to have created. Yet, these smart people created modules that didn't talk to each other. And its quality was, to be kind, on the rotten side.' It's not an uncommon story, but why and how does it happen? The answer, says Mei, is that code quality 'is defined by its patterns of dependencies,' not all of which have equal weight. And, as it turns out, team communication is the heaviest dependency of all.