It was probably inevitable that the memory of the master of the reality distortion field would itself fall victim to the Steve Jobs charisma.
If you’re hoping to catch a glimpse of the real Steve Jobs the “Steve Jobs” movie directed by Danny Boyle and written by Aaron Sorkin, is not the ticket to take, according to technology writer Larry Magid, who has interviewed the late Apple co-founder and those around him on numerous occasions for nearly three decades.
“The Steve Jobs depicted by Michael Fassbender was not the Steve Jobs I knew for more than 28 years,” Magid said in his recent article where he separates the fact from the fiction depicted in the latest Jobs biopic.
You can also check out Fast Company’s slideshow, Steve Jobs, The movie: 11 Things That Aren’t True About The Apple Cofounder
Joe Tucci and Michael Dell are being hailed for engineering what could the largest tech acquisition to date, but the roots of the Dell-EMC merger could likely be traced to the so-called digital natives like Google and Amazon have transformed the technology landscape.
In his article for Forbes.com, technology writer Gil Press outlines how the likes of Google altered IT requirements for performance and scalability in the early 2000s, how Facebook built upon this by developing an IT infrastructure that could deliver online service to one billion people, and how Amazon carried things even further by establishing the concept of IT-on-demand.
He argues that these developments have forced Dell and EMC to join forces in order to survive the “new world order.”
The reigning mobile platform, outside the corporate world, just got a security boost with the release of the Android 6.0 Marshmallow operating system.
The new OS comes with a lot of user-requested updates. For instance, high-profile vulnerabilities such as the Stagefright bug may have had something to do with the introduction of a new “Android security patch level” feature aimed at highlighting Android’s monthly security patch program.
Rather than just show users version update numbers, the feature allows users to see how out of date their device is.
The Smart Lock for Passwords feature allows a third-party service to tie a user’s login information to his Google account so that the app is already logged in when the user opens it.
Google also gave users greater permission controls over their devices and their data.
Best of expertIP
After last week’s maddening showdown with the Texas Rangers, the Toronto Blue Jays are finally off to the American League Championship Series.
There are some vital lessons in the Blue Jays’ 22-year journey the playoffs that IT professionals can apply to their own careers and teams, according to technology writer Jared Lindzon.
For example, much like top tech companies the Jays’ post seasons run was achieved in large part by a number of key acquisitions this year.
Another leading factor in their success was teamwork. The players were totally committed to setting up their teammates up for success. While certain players stand out, shared success trumps personal glory both on and off the field, says Lindzon.
Appearing in an IT vendor Webinar is a great way to raise your profile, get your company noticed and snap up some product discounts and perks as well.
Unfortunately, many IT pros are more at ease being behind scenes rather than performing in front of a camera.
Vawn Himmelsbach distils on-cam must-dos into three simple steps guaranteed to give even the most camera-shy of IT pros a leg up on their Webinar debut.
Remember: Talk to your peers, not screens.
Don’t go digital just to save on operations costs and create internal efficiencies; do it to provide better customer service.
That’s the message to Canadian banks of Gino Zucca, director of Internet of Everything (IOE) strategy and marketing development at Cisco Systems Inc.
“(Businesses) have gotten away from that customer experience and we need to drive that back with personalization and context,” he told journalist Christine Wong.
IT and business decision makers in banks should take heed of a findings brought up by a recent Cisco survey.
The poll of 7,200 bank customers in 12 countries revealed that 75 % of respondents would take their money to another bank if it offered “digitally delivered services that made their interaction and transactions easier, faster, more convenient and productive.”
“Technology is such a critical part of business operations that senior leadership teams must have a clear sense of how it is being used, and how vulnerable they might be to a data breach or other attack,” according to Dax Nair, director of marketing for unified communications at Allstream.
Unfortunately, the IT industry has always been filled with jargon and obscure abbreviations and as technology continues to become more complex and pervasive things tend to become more complex, especially if you don’t work in IT, he said. Unfamiliarity with such terms is likely one of the reasons why many business leaders not been kept up to speed on the latest security threats.
With this in mind, Nair has compiled a list of 60 of the most common terms that normally come up in cyber security discussions.
In this first installment of three articles, he tackles the letters A to D as in “anti-virus” and DDoS.