Tech Insights
Apr. 3, 2013

High-skilled visa requests likely to exceed supply as Congress looks to expand program
The Associated Press via The Huffington Post
The Homeland Security Department expects applications for high-skilled immigration visas to outpace the available supply in a matter of days, one of the fastest runs on work permits in years and a sign of continued economic recovery amid new hiring by U.S. technology companies. The urgent race for such visas — highly desired by Microsoft, Apple, Google and other leading technology companies — coincides with congressional plans to increase the number available to tech-savvy foreigners.More

Contact your representative opposing lowering graduation requirements
We need your help in communicating ASAP to Texas senators, the lieutenant governor and governor on an issue critical to our industry and children's future in Texas. This week, the Texas House approved HB 5, a bill that decreases graduation requirements for high school students. HB 5 and its Senate counterpart, SB 3, would eliminate the state's current 4x4 recommended graduation plan and reduce the number of end-of-course exams from 15 to five, rolling back 20 years of academic improvements in Texas.More

BYOD: Best practices for mitigating major mobile-device security risks
According to Brian J. Thomas and Brittany Teare from Weaver LLP, organizations considering BYOD policies need to incorporate the following best practices that address four major mobile-device security threat vectors.More

10 college courses for high-tech job preparation
As technology continues to develop rapidly, universities have to adjust their curriculum to keep their students up to date. Innovative colleges across the country have developed thought-provoking STEM courses to ensure that their students are marketable and career-ready upon graduation, often utilizing high-demand software skills such as computer-aided drawing.More

Robot ants blaze trails with pheromones of light
PLOS via IEEE Spectrum
Insects are masters of the swarm. Bugs like bees, termites and ants manage to do all sorts of complicated and productive things, despite the fact that each insect is really not that smart. The manifestation of complex behaviors from simple systems is appealing to roboticists who otherwise have to try to figure out all kinds of complicated localization and navigation tricks all by themselves. Researchers from the New Jersey Institute of Technology, in Newark, and at the Research Centre on Animal Cognition, in Toulouse, France, are using swarms of antlike robots to efficiently navigate networks without any sort of cleverness at all.More

Smartphone battery life: Back to the future
Mike Feibus, principal analyst at TechKnowledge Strategies, recently dug out an old cellphone for a friend to use in a pinch. It was an LG Shine, a circa-2007 slider that was one of the glitzier feature phones in its day, albeit nothing to write home about in 2013. With all that's packed into smartphones today, it's difficult to imagine the Shine as anything more than a quaint relic. Surprisingly, his friend was thrilled because the Shine lasted all day on a single charge. Many of us haven't seen that since, well, 2007.More

Famous butterfly inspires anti-counterfeiting nanotechnology
The Globe and Mail
Anti-counterfeiting technology is a hot commodity: Everything from banknotes to credit cards to purses to replacement inkjet cartridges are potential clients for devices like holograms, which — being hard for counterfeiters to replicate at Kinko's — prove that an item is the real deal. But holograms aren't as hard to duplicate as once they were; the technology has just become too widely available.More

Nebula builds a cloud computer for the masses
Bloomberg Businessweek
For his sixth-grade science fair project, Chris Kemp put together a cold fusion kit. In seventh grade, he built a particle accelerator, using a 300,000-volt generator and a vacuum tube. His teachers thought his dad had helped; neither project won first place. "I pretty much wrote off science at that point," says the 35-year-old Kemp, who eventually returned to it with a focus on computers. While his latest project still may not win any grade school science fair prizes, it'll probably change the nature of cloud computing.More

Is cloud computing experiencing the same security threats as enterprise computing?
People have always feared that cloud computing is inherently lacking in security because of the distribution methods used, allowing it to be more public than necessary. But research and reports indicate that it is not less secure than enterprise computing as they actually both suffer from the same types of attack. And it does not matter if you are a small organization or a large one you will still be the target of cyberattacks as most of them are opportunistic in nature.More

Infographic: NOOB technique demystifies cloud computing
With the launch of its patent-pending Neo-Organizational Optimization Brainstorm technique, independent strategic technology communications and PR practice Eastwick announced it has exposed what really happens in the cloud. Some seven years in the making, NOOB aggregates social collaboration platforms, neural networks, big data analytics, sentiment tools and virtual payment systems to finally reveal the enigmatic logistics and inner workings of the cloud, Eastwick said.More

BYOD: Best practices for mitigating major mobile-device security risks
According to Brian J. Thomas and Brittany Teare from Weaver LLP, organizations considering BYOD policies need to incorporate the following best practices that address four major mobile-device security threat vectors.More

Commentary: 8 tools changing business technology resiliency
What do cloud gateways, emergency communications tools, and disaster recovery as a service all have in common? All are changing the way businesses run their continuity programs.More

5 myths of cloud computing
Data Center Knowledge
Technologies around the Internet and the WAN have been around for some time. However, it wasn't until very recently that a specific term began circulating that was supposed to emphasize the combination of these technologies.More

5 strategic tips for avoiding a big data bust
Big data has arrived as a big-business initiative. But the hip, experimental, ad hoc veneer of blending data streams to surface bold discoveries belies a massive cultural and technological undertaking not every organization is ready for. Without a strategic plan that includes coherent goals, strong data governance, rigorous processes for ensuring data accuracy and the right mentality and people, big data initiatives can easily end up being a big-time liability rather than a valuable asset.More

10 big data trends from the GigaOM Structure Data conference
GigaOM Structure Data revealed trends that represent the 10 new rules of the road to make big data an effective and profitable reality at your company. If you are going to implement big data in your enterprise, start with the applications. While that is good advice for any tech or business executive considering where to invest his or her technology dollar, that advice is particularly trenchant in the world of big data.More

How do you predict March Madness winners?
Business 2 Community
Jay Coleman of the University of North Florida, Mike DuMond of Charles River Associates and Allen Lynch of Mercer University developed a formula to predict which Division I men's basketball teams will qualify for March Madness, the NCAA tournament that has evolved into a springtime for sports fans around the country. Their so-called Dance Card formula uses predictive analytics and business intelligence software, and this year it was 100 percent accurate, predicting 37 of the 37 at-large teams this season.More

7 insights on hiring data gurus
Despite the weak economy and zero growth in many IT salary categories, business intelligence, analytics, information integration and data warehousing professionals are seeing a slow-but-steady rise in income. Here are seven insights to keep in mind when hiring or taking a new job.More

5 ways to make employees happy when there are no raises in sight
Fast Company
They wait. As team members, they wait for their CEO or manager to recognize the work they have done, with hopes of a raise or recognition at year-end. If they're lucky, they get a midyear performance check-in. Good managers use it to celebrate others' talents first, before going into areas of growth. Yet it can't be the only time of the year. Here's the key: Each week, you can reward your employees, even if it's not with a reward or promotion, if you commit yourself to it. Here are some free and effective ways to do it.More