Video: Zombie Cookies, IT Budgets & Twitter Hacks - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile
Commentary
1/16/2015
12:00 AM
Connect Directly
LinkedIn
Google+
Twitter
RSS
100%
0%

Video: Zombie Cookies, IT Budgets & Twitter Hacks

This Week In 60 Seconds looks at zombie cookies, your 2015 IT budget, the rise of open source storage, and more.

 

Our weekly video wrapup sounds the alarm on Verizon’s zombie cookies. We also share a CIO’s perspective on how technology shifts have disrupted IT budget assumptions. Plus we chart the rise of open source storage, and parse the difference between cyber-terrorism and vandalism in the CENTCOM Twitter hack.

You can find links to the full stories below. And don’t forget to answer our question of the week: Would you share secure login credentials with colleagues? Let us know in the comments section.

Verizon Wireless Customers Face ‘Zombie Cookies’

How To Mess Up IT Budgeting In 2015

Open Source Storage Gains Traction

US CENTCOM Twitter Hijack ‘Purely’ Vandalism

Drew is formerly editor of Network Computing and currently director of content and community for Interop. View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Commentary
Gartner Forecast Sees 7.3% Shrinkage in IT Spending for 2020
Joao-Pierre S. Ruth, Senior Writer,  7/15/2020
Slideshows
10 Ways AI Is Transforming Enterprise Software
Cynthia Harvey, Freelance Journalist, InformationWeek,  7/13/2020
Commentary
IT Career Paths You May Not Have Considered
Lisa Morgan, Freelance Writer,  6/30/2020
White Papers
Register for InformationWeek Newsletters
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
Slideshows
Flash Poll