Feeds

DOH! Google’s internet of things vision is powered by… Mac OS

This dogfood tastes of Apple

Choosing a cloud hosting partner with confidence

Few companies have as all encompassing a vision as our friends at Google. From handsets and cloud apps, to airships via, ad sales and Chromebooks, this is the company that reckons anything you can do, it can do better. Or at least do with an ad on it.

No, there’s nothing fruity about our vision of the future

Is that a MacBook we see before us?

So we couldn’t help but be drawn into its presentation on the Internet of Things, wearable tech and smart machines at last week's Cloud World Forum.

We weren't disappointed as the presentation showed a succession of charmingly “real” people marvelling at the Googleplex’s outputs, particularly those friendly little driverless cars.

There was only one omission, at least in our time watching. Where were the Chromebooks? Or did someone blow a fruit-shaped hole in the cover of the presenter's laptop?

Which raises two questions: has peace broken out in the valley? And if not, does facial egg count as a wearable? ®

Secure remote control for conventional and virtual desktops

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.