Archives by date

You are browsing the site archives by date.

Bitcon: The naked truth about bitcoin (Podcast)

Best-selling author Jeffrey Robinson and I discuss his new book: Bitcon: The naked truth about bitcoin in this podcast. I’ve included some highlights from my interview and from the book here as well. As you can see from the book’s cover, Jeffrey Robinson and I are on the same page in that those who believe in and love Bitcoin are… Read more →

Schneider Electric: Digital transformation, internet of things, sustainability, and operational technology

Looking across the landscape of enterprise technology, few companies have the scale and breadth of Schneider Electric, with over $30 billion in revenue and 130,000 employees in more than 100 countries. Chris Hummel (image courtesy of CXO-Talk) Schneider Electric is in the midst of transforming itself from a supplier of components and industrial parts to a broader technology company. This… Read more →

Five challenges facing Apple in 2015

Summary: Apple has had a cracking year, with stellar sales and sky-high revenues. But despite billions in the bank and products flying off the shelves in record numbers, the Cupertino giant has challenges to face over the coming year. By Adrian Kingsley-Hughes for Hardware 2.0 | December 29, 2014 — 14:29 GMT (06:29 PST) Follow @the_pc_doc Source Article from http://www.zdnet.com/pictures/five-challenges-facing-apple-in-2015/#ftag=RSSbaffb68Five… Read more →

Twitter reports successful year in Brazil

This year’s World Cup and presidential elections in Brazil prompted an increase of 25,6 percent for Twitter’s local user base – the best growth rate in the country since 2010, according to the company. Both events also meant a big boost for Twitter in terms of business developmentin Brazil, as the company grew closer to TV broadcasters, which promote the… Read more →

Flipping DRAM bits – maliciously

As documented in DRAM error rates: Nightmare on DIMM street, DRAM error rates are hundreds to thousands of times higher than thought — a mean of 3,751 correctable errors per DIMM per year. Which assumes your DIMM has error correcting code (ECC) to correct those errors. If not: Everything is fine until the data corruption means a missed memory reference… Read more →

Raspberry Pi: Raspbian and NOOBS releases

What better way to spend the holidays, and prepare for the New Year, than with a new release of Raspbian (Debian GNU/Linux specifically for the Raspberry Pi), and a new NOOBS package? For those who don’t have a Raspberry Pi (or more than one) already, or might have just gotten one for Christmas, the foundation has posted a Got a… Read more →

2015: Six IT nightmares that will keep us all awake at night

The CISO, the CIO, the CEO, or you: Who is really responsible for cybersecurity? Source Article from http://www.zdnet.com/pictures/2015-six-worsening-it-problems-that-will-keep-us-all-awake-at-night/#ftag=RSSbaffb682015: Six IT nightmares that will keep us all awake at nighthttp://www.zdnet.com/pictures/2015-six-worsening-it-problems-that-will-keep-us-all-awake-at-night/#ftag=RSSbaffb68http://www.zdnet.com/blog/rss.xmlLatest blogs for ZDNetLatest blogs for ZDNethttp://i.zdnet.com/images/spry/zdnet_300x300.jpg

Merry Xm#@! ​Lizard Squad took down Xbox and Playstation networks

2014 in security: The biggest hacks, leaks, and data breaches Source Article from http://www.zdnet.com/article/merry-xm-lizard-squad-takes-down-xbox-and-playstation-networks/#ftag=RSSbaffb68Merry Xm#@! ​Lizard Squad took down Xbox and Playstation networkshttp://www.zdnet.com/article/merry-xm-lizard-squad-takes-down-xbox-and-playstation-networks/#ftag=RSSbaffb68http://www.zdnet.com/blog/rss.xmlLatest blogs for ZDNetLatest blogs for ZDNethttp://i.zdnet.com/images/spry/zdnet_300x300.jpg

Geek lit: Microsoft’s Mark Russinovich and his Rogue Code

Earlier this year, Mark Russinovich, a Microsoft Technical Fellow who works on Azure, released Rogue Code – but not rogue code. It’s the third techno-thriller in a trilogy based on Jeff Aiken, the main character in Zero Day and Trojan Horse. Each book is based on computer-related threats to modern society. The main ones in Rogue Code are rootkits and… Read more →