Related Content
![]() |
Managing Enterprise Application Portfolios Using Cloud Marketplaces Cloud marketplaces, where customers can purchase component applications, have been around for a few years, but with an increasing interest in moving enterprise applications to cloud services, there is a new push to add features and functionality that appeal to not only their core SMB market segment. |
|
![]() |
Five Principles from Chess That Can Change Your Software Game When you start analyzing the two strategic activities of playing chess and developing software, you will notice they share many core principles. Defining a goal, recognizing patterns, and learning from mistakes are just some of the important concepts to keep in mind with both chess and software. |
|
![]() |
A Quicker, More Effective Hiring Solution Is on the Way Given the increasing demand for software talent, hiring is a big task in the IT world. But a startup has an idea for a platform that would help bring objectivity to the entire hiring process, from data collection to skill assessment to prospect evaluation. Would you trust your hiring to the cloud? |
|
![]() |
Predictive Policing Is on the Rise Traditionally, technology has been used in a reactive way to address a crime after it has happened. Recently, there's been a proactive trend towards predictive policing—especially through efforts by software giants such as Microsoft—to potentially curb a crime before it even happens. |
|
![]() |
The Abstraction Problem As technical people, when we give too much information in a project status meeting, we can overwhelm managers. Worse, if we don’t answer the implied question ("When is this thing going to be done?"), the managers will get answers elsewhere. Read on for ideas to get you speaking the same language. |
|
![]() |
Announcing Raspberry Pi 2 The next-generation Raspberry Pi 2 is now available, and when the big announcement was recently made, the website buckled with over one million more requests than it usually handles, according to the Raspberry Pi Foundation. |
|
![]() |
Report: Connected Cars Have Weaker Security Than We Thought Today's connected cars offer many technological conveniences. But with those features come some risks. The Wi-Fi, Bluetooth, and cellular connections in these cars can fall prey to hacking attacks, which can jeopardize people’s physical safety and private information—and the security is pretty lax. |
|
![]() |
Businesses Cash In on Open Government Data Access to data is becoming increasingly obtainable through open data projects that are now available globally, often sponsored by governmental bodies. For example, many real estate websites leverage federal housing data to power their information. How else can we benefit from open government data? |