Android surpassed Microsoft's Windows in March to become the most popular operating system on the internet, according to figures compiled by GlobalStats, the research arm of web analytics company StatCounter.GlobalStats found that, worldwide, Android had a 37.93 percent internet usage market share, just ahead of Windows at 37.91 percent. "This is a milestone in technology history and the end of an era," said Aodhan Cullen, StatCounter's CEO. "It marks the end of Microsoft’s leadership worldwide of the OS market which it has held since the 1980s. It also represents a breakthrough for Android, which held just 2.4 percent of global internet usage share only five years ago."To read this article in full or to leave a comment, please click here
Changing your business processes to match your software sounds like a classic case of the tail wagging the dog. After all, business leaders are responsible for deciding how their company is run, and software is supposed to support that, helping the company run as efficiently as possible.Yet this is exactly what is happening in 82 percent of enterprises, according to a survey by TrackVia, maker of a low-code software development platform. These companies report changing a part of their business operations or processes to match the way their software works.Is allowing corporate software to dictate how a company is run an abrogation of management's duty to manage, or can it sometimes be the best way to manage a company?To read this article in full or to leave a comment, please click here
Linux containers have been around for almost a decade, but it was only with the release of Docker four years ago that large numbers of developers began to adopt the technology. Now it seems that containers are everywhere and their popularity continues to rise.To read this article in full or to leave a comment, please click here(Insider Story)
Talk about starting a business based on open source software and the conversation will inevitably shift to Red Hat. That's because the Linux vendor is a shining example of a company that's making money from an open source product. But how easy is it really to establish an open source startup that makes money? For every success story like Red Hat there are companies like Cyanogen that fail to thrive and projects that are abandoned.To read this article in full or to leave a comment, please click here
Eight years ago, the CyanogenMod project exploded onto the mobile device software scene. The Android-based open source mobile operating system quickly caught the attention of developers, Android fans and investors, and attracted interest from tech giants including Microsoft and Google. But at the end of last year the project imploded spectacularly. Today the CyanogenMod project is no more, but the arc of its story offers fascinating insight into the world of open source software development.The project started out innocently enough following the discovery, in 2008, of a way to root mobile phones running Google's Android operating system, allowing modified firmware to be installed on rooted devices. One such piece of firmware was created by a developer called Steve Kondik, whose online handle was Cyanogen — a colorless toxic gas made by oxidizing hydrogen cyanide. The modified firmware was known as CyanogenMod.To read this article in full or to leave a comment, please click here
Slack exploded onto the scene three years ago, and since then just about everyone from industry giants like Facebook to small groups of open source developers have been getting in on the team collaboration software act.Today the pace of collaboration software development and innovation is frenetic, and according to research by G2 Crowd, a peer-to-peer business review platform, the boom in corporate adoption shows no sign of slowing down in the near future. It found that more than half of all companies have already implemented team collaboration solutions of one kind or another, and 31 percent plan to adopt one in the next two years.To read this article in full or to leave a comment, please click here
Adversity makes strange bedfellows, and in the case of VMware — a company that has made its fortune selling server virtualization software — that bedfellow is Amazon Web Services (AWS), the public cloud leviathan.Let's rewind to the middle of October, when Mark Lohmeyer, a VMware cloud business unit vice president, announced that the company was forming a strategic partnership with AWS so that VMware's server virtualization and other software could be run in the AWS public cloud. The idea is that VMware customers using the company's software to run a private cloud in their own data centers will be able to expand into a similar VMware infrastructure run in AWS's public cloud, thereby forming a VMware-based hybrid cloud. The VMware software (called vCenter) used by company administrators to manage the private cloud will reach into the AWS cloud to manage the VMware software running there as well.To read this article in full or to leave a comment, please click here
Picture this: Your company's network is facing a DDoS attack, but you have no idea who is responsible or what their motivation might be. Without this knowledge, you can't tell if they want money in exchange for stopping the attack or if the attack is a diversion to occupy your security team while your network is being penetrated and commercial secrets are stolen.In the aftermath of a network breach it can also be incredibly useful to know some information about the likely attackers. That's because knowing who they were — or just where they were from — can help you carry out a more accurate damage assessment exercise. This knowledge can guide you where to look for signs of data compromise, and what other specifics (such as exploit kits or Trojans that may have been left behind) to search for.To read this article in full or to leave a comment, please click here
Picture this: Your company's network is facing a DDoS attack, but you have no idea who is responsible or what their motivation might be. Without this knowledge, you can't tell if they want money in exchange for stopping the attack or if the attack is a diversion to occupy your security team while your network is being penetrated and commercial secrets are stolen.In the aftermath of a network breach it can also be incredibly useful to know some information about the likely attackers. That's because knowing who they were — or just where they were from — can help you carry out a more accurate damage assessment exercise. This knowledge can guide you where to look for signs of data compromise, and what other specifics (such as exploit kits or Trojans that may have been left behind) to search for.To read this article in full or to leave a comment, please click here
Microsoft is betting on artificial intelligence (AI) with the creation at the end of September of a new AI and Research Group. This newly formed group brings together Microsoft's research organization and more than 5,000 computer scientists and engineers focused on AI and is now the fourth major division in the company, on par with the Windows, Office and Cloud divisions.The job of the AI and Research Group will be to work on four overarching initiatives:
Harnessing AI through agents such as Cortana, the company's digital personal assistant
Infusing AI into Skype, Office 365 and every other Microsoft application
Making cognitive capabilities such as vision and speech and machine analytics available to external developers
Using Azure to build a powerful AI supercomputer in the cloud to provide "AI as a Service”
[ Get ready for the bot revolution]To read this article in full or to leave a comment, please click here
Last month, BlackBerry announced that it was quitting the phone-making business, but the BlackBerry name will live on. That's because the company has entered into a licensing agreement with an Indonesian company that will manufacture, distribute and promote BlackBerry-branded devices running BlackBerry software.To read this article in full or to leave a comment, please click here(Insider Story)
Donald Knuth, Ken Thompson, Dennis Ritchie, Grace Hopper: The United States has produced some of the greatest software engineers who have ever lived.But outside the United States computer technology and education have become far more accessible over the last 20 years or so, and that means that in China and many other less developed countries there are now plenty of young minds that have been trained to become skilled programmers.So which countries produce the best coders is an interesting question to ask. Perhaps more importantly why do some countries lead the way?
[ Also on CIO.com: The 13 developer skills you need to master now ]To read this article in full or to leave a comment, please click here
"If you use any open source software, you have to make the rest of your software open source." That's what former Microsoft CEO Steve Ballmer said back in 2001, and while his statement was never true, it must have spread some FUD (fear, uncertainty and doubt) about free software. Probably that was the intention.This FUD about open source software is mainly about open source licensing. There are many different licenses, some more restrictive (some people use the term "protective") than others. Restrictive licenses such as the GNU General Public License (GPL) use the concept of copyleft, which grants people the right to freely distribute copies and modified versions of a piece of software as long as the same rights are preserved in derivative works. The GPL (v3) is used by open source projects such as bash and GIMP. There's also the Affero GPL, which provides copyleft to software that is offered over a network (for example as a web service.)To read this article in full or to leave a comment, please click here
Invisibility cloaks sound like a lot of fun, and the good news is that they really do exist. But the reality, for now at least, is not nearly as fantastical as what you imagine.To read this article in full or to leave a comment, please click here(Insider Story)
Once upon a time if you wanted employees to collaborate you'd probably encourage them to use Internet Relay Chat (IRC). But about three years ago Slack appeared on the scene, and since then it's been eating IRC's lunch. That's because it's much easier to install, get up and running, and use than IRC, making it massively popular with nontechies. And thanks to a well-documented API it's easy to integrate with other programs and services. That means it's customizable and infinitely extensible, which makes it popular with developers.To read this article in full or to leave a comment, please click here(Insider Story)
Product migrations are often the stuff of nightmares. But for Richard Cross, CIO of U.K.-based multinational engineering company Atkins, the decision to migrate 18,000 users from their familiar desktop productivity applications to Office 365 in the cloud wasn’t a difficult one to make.To read this article in full or to leave a comment, please click here(Insider Story)
The ancient Chinese military strategy guide The Art of War says that if you want to have a chance of prevailing in battle, you need to know your enemy. It’s good advice for the battlefield, and it's also good advice if you want to beat hackers in their constant attempts to take over your network.But in order to know these hackers you need to understand their motivations, and in many cases those motivations may not be what you expect. That's according to Dan Kaminski, the security expert who discovered a fundamental flaw in the Internet's Domain Name System (DNS) protocol in 2008 and who discovered flaws in the widely used SSL protocol a year later. Kaminski is a frequent speaker at Black Hat Briefings, and now works as Chief Scientist at White Ops, a security firm specializing in detecting bot and malware fraud.To read this article in full or to leave a comment, please click here
The ancient Chinese military strategy guide The Art of War says that if you want to have a chance of prevailing in battle, you need to know your enemy. It’s good advice for the battlefield, and it's also good advice if you want to beat hackers in their constant attempts to take over your network.But in order to know these hackers you need to understand their motivations, and in many cases those motivations may not be what you expect. That's according to Dan Kaminski, the security expert who discovered a fundamental flaw in the Internet's Domain Name System (DNS) protocol in 2008 and who discovered flaws in the widely used SSL protocol a year later. Kaminski is a frequent speaker at Black Hat Briefings, and now works as Chief Scientist at White Ops, a security firm specializing in detecting bot and malware fraud.To read this article in full or to leave a comment, please click here
More companies are contributing to open source projects, but the management of open source software is still chaotic.To read this article in full or to leave a comment, please click here(Insider Story)
Larry Wall, the original author of the Perl programming language, once said that great programmers have three virtues: laziness, impatience and hubris.To read this article in full or to leave a comment, please click here(Insider Story)