All posts on May, 2017


4 ways blockchain is the new business collaboration tool

While blockchain may have cut its teeth on the cryptocurrency Bitcoin, the distributed electronic ledger technology is quickly making inroads across a variety of industries.

That’s mainly because of its innate security and its potential for improving systems  operations all while reducing costs and creating new revenue streams.

David Schatsky, a managing director at consultancy Deloitte LLP, believes blockchain’s diversity speaks to its versatility in addressing business needs, but “the impact that blockchain will have on businesses in various industries is not yet fully understood.”

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Microsoft’s P language is aimed at where cloud, AI, and IoT meet

Microsoft is positioning its P language as a solution for asynchrony in a world where this capability is becoming increasingly vital for the cloud, artificial intelligence, and embedded systems.

Geared to asynchronous event-driven programming, the open source P unifies modeling and programming into a single activity. “Today’s software uses cloud resources, is often embedded in devices in the physical world and employs artificial intelligence techniques,” said Shaz Qadeer, a principal researcher at Microsoft. Such applications feature asynchrony, leading to issues with race conditions and “heisenbugs” (named after the Heisenberg Uncertainty Principle), which are timing-related bugs that often disappear during an investigation of it. P was was built to address the challenges.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Connecting with work from the road? Here’s how to stay safe

Every company has workaholics who can’t leave their duties behind when heading out on vacation. They’re kind of worker who, if the hotel doesn’t have Wi-Fi, will rush to the closest coffee shop or eatery to stay connected, check email and jump onto a video conference call.

Those are the kinds of insecure wireless networks that make IT security managers nervous. 

And for good reason. Public Wi-Fi networks at cafes and coffee shops are open to, and can be accessed by, anyone, according to mobile security vendor iPass. They require neither security keys and passphrases nor firewall protection. That leaves  employees vulnerable to man-in-the-middle attacks.

To read this article in full or to leave a comment, please click here

Read more 0 Comments