This message contains images. If you don't see images, click here to view.
Click here to advertise in this news brief.




  Mobile version    RSS    Subscribe    Unsubscribe    Archive    Media Kit Apr. 3, 2013

Home   About Us   Membership   Newsroom   Entrepreneurship   Tech Quest   Tech Titans   Contact Us      


 



High-skilled visa requests likely to exceed supply as Congress looks to expand program
The Associated Press via The Huffington Post
The Homeland Security Department expects applications for high-skilled immigration visas to outpace the available supply in a matter of days, one of the fastest runs on work permits in years and a sign of continued economic recovery amid new hiring by U.S. technology companies. The urgent race for such visas — highly desired by Microsoft, Apple, Google and other leading technology companies — coincides with congressional plans to increase the number available to tech-savvy foreigners.
   Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE  




ASSOCIATION NEWS


Contact your representative opposing lowering graduation requirements
MTBC
We need your help in communicating ASAP to Texas senators, the lieutenant governor and governor on an issue critical to our industry and children's future in Texas. This week, the Texas House approved HB 5, a bill that decreases graduation requirements for high school students. HB 5 and its Senate counterpart, SB 3, would eliminate the state's current 4x4 recommended graduation plan and reduce the number of end-of-course exams from 15 to five, rolling back 20 years of academic improvements in Texas.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


BYOD: Best practices for mitigating major mobile-device security risks
MTBC
According to Brian J. Thomas and Brittany Teare from Weaver LLP, organizations considering BYOD policies need to incorporate the following best practices that address four major mobile-device security threat vectors.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE




HOT TOPICS


10 college courses for high-tech job preparation
Mashable
As technology continues to develop rapidly, universities have to adjust their curriculum to keep their students up to date. Innovative colleges across the country have developed thought-provoking STEM courses to ensure that their students are marketable and career-ready upon graduation, often utilizing high-demand software skills such as computer-aided drawing.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Robot ants blaze trails with pheromones of light
PLOS via IEEE Spectrum
Insects are masters of the swarm. Bugs like bees, termites and ants manage to do all sorts of complicated and productive things, despite the fact that each insect is really not that smart. The manifestation of complex behaviors from simple systems is appealing to roboticists who otherwise have to try to figure out all kinds of complicated localization and navigation tricks all by themselves. Researchers from the New Jersey Institute of Technology, in Newark, and at the Research Centre on Animal Cognition, in Toulouse, France, are using swarms of antlike robots to efficiently navigate networks without any sort of cleverness at all.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE
Looking for similar articles? Search here, keyword ROBOTICS.


Smartphone battery life: Back to the future
InformationWeek
Mike Feibus, principal analyst at TechKnowledge Strategies, recently dug out an old cellphone for a friend to use in a pinch. It was an LG Shine, a circa-2007 slider that was one of the glitzier feature phones in its day, albeit nothing to write home about in 2013. With all that's packed into smartphones today, it's difficult to imagine the Shine as anything more than a quaint relic. Surprisingly, his friend was thrilled because the Shine lasted all day on a single charge. Many of us haven't seen that since, well, 2007.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Famous butterfly inspires anti-counterfeiting nanotechnology
The Globe and Mail
Anti-counterfeiting technology is a hot commodity: Everything from banknotes to credit cards to purses to replacement inkjet cartridges are potential clients for devices like holograms, which — being hard for counterfeiters to replicate at Kinko's — prove that an item is the real deal. But holograms aren't as hard to duplicate as once they were; the technology has just become too widely available.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


  FEATURED COMPANIES
Goodman Networks

Our industry-leading wireless network solutions enable our customers to be first to market with new technologies and services, and improve business results. MORE
PwC
PwC concentrates on 16 key industries and provides targeted services that include — but are not limited to — audit and assurance, tax, advisory services, human resources, deals, forensics, and consulting services. MORE


TRENDING ARTICLES
Missed last week's issue? See which articles your colleagues read most.

    5 myths of cloud computing (Data Center Knowledge)
CIOs must embrace digital business (InformationWeek)
5 weird habits that make people successful and awesome (Fast Company)
Superefficient nanowires could be future of solar energy (redOrbit)
Better eyes for flying robots (IEEE Spectrum)

Don't be left behind. Click here to see what else you missed.


CLOUD COMPUTING


Nebula builds a cloud computer for the masses
Bloomberg Businessweek
For his sixth-grade science fair project, Chris Kemp put together a cold fusion kit. In seventh grade, he built a particle accelerator, using a 300,000-volt generator and a vacuum tube. His teachers thought his dad had helped; neither project won first place. "I pretty much wrote off science at that point," says the 35-year-old Kemp, who eventually returned to it with a focus on computers. While his latest project still may not win any grade school science fair prizes, it'll probably change the nature of cloud computing.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Is cloud computing experiencing the same security threats as enterprise computing?
CloudTweaks
People have always feared that cloud computing is inherently lacking in security because of the distribution methods used, allowing it to be more public than necessary. But research and reports indicate that it is not less secure than enterprise computing as they actually both suffer from the same types of attack. And it does not matter if you are a small organization or a large one you will still be the target of cyberattacks as most of them are opportunistic in nature.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Infographic: NOOB technique demystifies cloud computing
MarketingProfs
With the launch of its patent-pending Neo-Organizational Optimization Brainstorm technique, independent strategic technology communications and PR practice Eastwick announced it has exposed what really happens in the cloud. Some seven years in the making, NOOB aggregates social collaboration platforms, neural networks, big data analytics, sentiment tools and virtual payment systems to finally reveal the enigmatic logistics and inner workings of the cloud, Eastwick said.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


PRODUCT SHOWCASE
  Internap

Transform your IT Infrastructure into a competitive advantage with IT IQ from Internap, intelligent IT Infrastructure solutions that combine unmatched performance and platform flexibility. Since 1996, thousands of enterprises have entrusted Internap to deliver their online applications across our portfolio of connectivity, colocation, hosting, cloud and hybrid services. MORE
 


FEATURED ARTICLE
TRENDING ARTICLE
MOST POPULAR ARTICLE
BYOD: Best practices for mitigating major mobile-device security risks
MTBC
According to Brian J. Thomas and Brittany Teare from Weaver LLP, organizations considering BYOD policies need to incorporate the following best practices that address four major mobile-device security threat vectors.

Share on FacebookTwitterShare on LinkedinE-mail article
read more
Commentary: 8 tools changing business technology resiliency
InformationWeek
What do cloud gateways, emergency communications tools, and disaster recovery as a service all have in common? All are changing the way businesses run their continuity programs.

Share on FacebookTwitterShare on LinkedinE-mail article
read more
5 myths of cloud computing
Data Center Knowledge
Technologies around the Internet and the WAN have been around for some time. However, it wasn't until very recently that a specific term began circulating that was supposed to emphasize the combination of these technologies.

Share on FacebookTwitterShare on LinkedinE-mail article
read more


BIG DATA


5 strategic tips for avoiding a big data bust
InfoWorld
Big data has arrived as a big-business initiative. But the hip, experimental, ad hoc veneer of blending data streams to surface bold discoveries belies a massive cultural and technological undertaking not every organization is ready for. Without a strategic plan that includes coherent goals, strong data governance, rigorous processes for ensuring data accuracy and the right mentality and people, big data initiatives can easily end up being a big-time liability rather than a valuable asset.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


10 big data trends from the GigaOM Structure Data conference
eWeek
GigaOM Structure Data revealed trends that represent the 10 new rules of the road to make big data an effective and profitable reality at your company. If you are going to implement big data in your enterprise, start with the applications. While that is good advice for any tech or business executive considering where to invest his or her technology dollar, that advice is particularly trenchant in the world of big data.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


How do you predict March Madness winners?
Business 2 Community
Jay Coleman of the University of North Florida, Mike DuMond of Charles River Associates and Allen Lynch of Mercer University developed a formula to predict which Division I men's basketball teams will qualify for March Madness, the NCAA tournament that has evolved into a springtime for sports fans around the country. Their so-called Dance Card formula uses predictive analytics and business intelligence software, and this year it was 100 percent accurate, predicting 37 of the 37 at-large teams this season.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


7 insights on hiring data gurus
InformationWeek
Despite the weak economy and zero growth in many IT salary categories, business intelligence, analytics, information integration and data warehousing professionals are seeing a slow-but-steady rise in income. Here are seven insights to keep in mind when hiring or taking a new job.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


MANAGEMENT & MARKETING


5 ways to make employees happy when there are no raises in sight
Fast Company
They wait. As team members, they wait for their CEO or manager to recognize the work they have done, with hopes of a raise or recognition at year-end. If they're lucky, they get a midyear performance check-in. Good managers use it to celebrate others' talents first, before going into areas of growth. Yet it can't be the only time of the year. Here's the key: Each week, you can reward your employees, even if it's not with a reward or promotion, if you commit yourself to it. Here are some free and effective ways to do it.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE
 

Tech Insights
Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit

Danielle Wegert, Content Editor, 469.420.2696   
Contribute news

This edition of Tech Insights was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!
Recent issues
April 3, 2013
March 27, 2013
March 21, 2013
March 13, 2013



7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063