Remove 1996 Remove 2000 Remove Software Review Remove Technical Review
article thumbnail

15 Mobile Security Best Practices For SMBs (Or Anyone Else For That Matter)

YoungUpstarts

Use an access code/password/or pattern sequence to lock/unlock the device when it is not in use. The preferred method is to set a pin number as the unlock code. However, the Android platform is more open and allows device owners to install their own software or other software that they download from the Internet.

Security 160
article thumbnail

How To Predict The Future

Feld Thoughts

I’m a huge fan of William and his writing as you can see from my review of his book Avogadro Corp. There seem to be two schools of thought on how to predict the future of information technology: looking at software or looking at hardware. A big technical challenge we studied was piping streaming video over networks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business Week Report on “Radical Future of R&D” Misses Critical Capital Markets Link in Innovation Ecosystem

Pascal's View

These valid observations may be drawn from primary research sources such as the work published by the National Academies, whose most recent report, Assessing the Impact of Changes in the Information Technology R&D Ecosystem: Retaining Leadership in an Increasingly Global Environment , was released several months ago. In the 1990s the U.S.

IPO 38
article thumbnail

Bubble Trouble? I Don’t Think So

Ben's Blog

Lately, everybody seems to be talking about a new technology bubble. A Comparison Between Today’s “Bubble” and the Last Tech Bubble. In the great bubble of 1998-2000, the boom in public valuations mirrored the boom in private valuations. Are the prognosticators correct? Will we head mercilessly into another crash?