Around the IT Industry 3/26-3/30

by Modis on March 30, 2012

No Gravatar

The Future of Bluetooth

Bluetooth is the wireless technology that many people associate with cell phone headsets and some home entertainment devices. The technology is now 13 years old and still going strong, with a plethora of potential applications just over the horizon. From medical monitoring technology to smart clothes, Bluetooth has only begun to scratch the surface of possibility.

Who Manages Your IT?

Businesses around the world have a variety of ways they manage their technological needs, whether it be outsourced technical support over the phone or in-house technical specialists who provide hands-on service. There are certainly cost considerations for all manner of IT solutions, and the BBC has tips for enterprising businesspeople on how to find the right IT solution for their company.

Google Pays the Man Who Beat Their System

In the world of open-source program development, there is no greater pool of beta testers and bug hunters than your own user base. To that end, Google has awarded $60,000 to a man who beat the security on their Chrome Internet browser as part of an annual security competition designed to highlight weaknesses in the company’s programs so that they may be corrected in future versions.

Amazon’s Cloud

The amount of computing power necessary to keep Amazon’s massive cloud of data in safe, redundant storage for its millions of users has been estimated, but not confirmed, at over 400,000 servers. This computing backbone is a necessary component for many popular Internet services such as Dropbox and Netflix and is highly indicative of the sheer scope of Amazon’s operations.

Power Outages and Your Data

As pretty much anyone with any technical knowledge will tell you, properly safeguarding your valuable computer equipment against electrical surges is an important step in ensuring that your data remains intact.  However, this article will give you further insight on what causes these potentially harmful events and how they might harm your information… and more importantly, what you can do to increase your level of protection.

Related Posts

Leave a Comment

Previous post:

Next post: