IT Specialist Blogs

rss

News, Topics and Opinions on Information Technology

Specify Alternate Text

When making goals, it’s important to emulate people who have already mastered what you’re trying to learn. So in this case, what do super secure people do to stay safe online? Intel Security has the answer—here are the 5 habits of practically unhackable people: Think before ...

Specify Alternate Text

Billions and billions—it’s only a matter of time before this becomes the number of hacking incidents in a single year, because just in 2014, over one billion records were hacked out of 1,500 different hacking incidents, says a recent report.  Some other findings from the report: A ...

Specify Alternate Text

In the last decade the cheap computing available through the cloud has revolutionized the way startups do business. Starting with AWS, the cloud has made it infinitely easier and cheaper for small tech startups to build their product. Now, according to leading VC Accel Partners, a new trend is driving ...

Specify Alternate Text

If you’ve ever watched virtually any spy flick or James Bond movie you’re familiar with “bugs” – those little dime-sized metallic things that the bad guys would secretly stick under someone’s desk to record any conversation in the room—picked up by a receiver in their car. Or, the phone ...

Specify Alternate Text

These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year. While a lot of information, including creative materials, financials ...

Specify Alternate Text

Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It’s possible if you purchased a Lenovo PC any time in September of 2014 and thereafter. This Superfish software intercepts the Lenovo user’s traffic so that the user sees ads displayed that reflect their browsing habits. The problem with ...

Specify Alternate Text

As the scandal over NSA spying has unfolded, like a drip coffee pot, one revelation after another has come out revealing the extent to which the NSA possesses the power to pry into our private lives. In the latest NSA hack to emerge, we’ve discovered that the agency – ...

Specify Alternate Text

As the amount of data created continues to exponentially expand, companies and other organizations are becomingly increasingly interested in how to make sense of the data they generate. As a result, big data startups have become increasingly popular investments for VCs. A particularly interesting area within big data is ...

Specify Alternate Text

While my previous blog posts have concentrated primarily on the US tech sector and the American startup scene, some recent news out of Russia – yes, Russia! – actually caught my eye. And no, I’m not talking about Vladimir Putin’s latest machinations in Ukraine or Russian cybercriminals; rather, it ...

Specify Alternate Text

If you’re like most PC users, you’ve grown up using Microsoft Windows and Office and it would probably be tough to think about using a different OS. Maybe I’m projecting, but at least that’s how I feel. Luckily, there are now some amazing deal on Windows tablets available for the ...

Interested in submitting content for publication and syndication on the IT Specialist Network?

As a contributing writer on the IT Specialist Network, you can quickly gain exposure as an opinion leader or subject matter expert in information technology by informing a large audience of technical professionals. We welcome new and established authors that specialize in one or more sectors of the IT industry. Once your article(s) is approved for publication, it will be selectively syndicated throughout the IT Specialist Network.

Click here to contact us.