TruGreen Landcare CIO George Kelly is a realist. He not only knows the business-critical role of marketing at the nationwide commercial landscaping and property care company, but also that if IT doesn’t meet that department’s needs, they’ll look elsewhere.
Rumoured Nokia Windows RT tablet plans called bizarre
If true, reports that Nokia plans to release a tablet running Microsoft’s failed Windows RT OS are “bizarre” and “highly surprising” according to analysts who think the company should focus on its struggling smartphone business.
Leveraging in-memory data grid technology
Across a spectrum of industries, Middle East organisations today face challenges that traditional data tier scaling cannot easily resolve, says Red Hat’s Christina Wong.
SAP creates LAVA 'design language' to heat up analytics
SAP’s Business Objects BI (business intelligence) product line may soon begin receiving a visual overhaul based on a new “design language” or methodology called LAVA (Lightweight Applied Visual Analytics).
Windows 8 comes to open-source PCs with GizmoSphere board
The market for x86 open-source PCs is now a two-horse race, with GizmoSphere releasing schematics and design documents for hobbyists …
Demand for IT Director roles increases by 50% in one month
it director jobs, it sales jobs, it jobs, it job, it job seekers, it job marker, it jobs market, it jobs uae, it jobs sharjah, it jobs dubai, temporary it jobs, permanent it jobs
Apple plunges to No. 79 on Forbes innovative companies ranking
Apple’s innovation problems were highlighted today when Forbes published its 2013 list of the world’s most innovative companies and ranked Apple at No. 79.
Gartner: 75 percent of government CIO budgets flat or increasing
Despite a continuing drive to lower the cost of IT services, about 75 percent of government IT budgets globally were …
IBM to acquire endpoint security company Trusteer
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in …
Hackers targeting servers running Apache Struts applications, researchers say
Chinese hackers are using an automated tool to exploit known vulnerabilities in Apache Struts, in order to install backdoors on servers hosting applications developed with the framework.
Government urged to put up customised defence to combat cyber attacks
Investing in anti-virus software is no longer enough to counter cyber attacks on vital data systems, especially if national security is at stake.
Some government surveillance is 'essential' to fight terror
Some level of government surveillance is “essential” if the nation is to minimize the incidence of terrorist strikes like the …
Security-as-a-Service: IT's Dark Knight?
As hackers and attackers wreak havoc on the industry, businesses have been looking for a watchful protector to secure their assets. Is security-as-a-service the IT industry’s Dark Knight?
EMC acquires Aveska
EMC has acquired privately held Aveksa, which provides business-driven Identity and Access Management solutions. Effective immediately, Aveksa will operate within …
How to fix an overheating iMac; iMac is overheating: tips and advice
Mac fans working overtime? iMac shutting down? Read our overheating iMac tips and tricks How to fix an overheating iMac. Cool …
IBM to license Power chips to keep them relevant
IBM said Tuesday that it will begin licensing its Power chips to other companies, pursuing a direction that companies like …
HP consolidates record management applications
In a move to consolidate overlapping lines of software, Helwett-Packard is merging three of its records management products into a …
Solar-powered Ubuntu laptop to launch
A Canadian IT consultancy has announced that it will soon begin selling an Ubuntu laptop that “never needs to be …
Windows tablets capture more share, but Surface suffers
Windows’ share of the tablet market grew slightly in the second quarter, as shipments also ticked up in the face of a slow-down by tablets overall, researcher IDC said today.
If governments ban China-based Lenovo, should companies?
If US intelligence agencies ban the computers of a Chinese company from classified networks should companies also avoid the same products? What if the vendor is one of the world’s largest PC makers?