The rise of software-defined networks (SDNs) is one of the big tech stories of 2013. For many IT organizations looking at deploying the technology, it's no longer a question of 'if,' but 'when,' according to Gartner's Joe Skorupa, research vice president for Data Center Convergence and Andrew Lerner, research director for Networking, at Gartner.
The U.S. Federal Communications Commission should limit the amount of spectrum that giant mobile carriers AT&T and Verizon Communications are able to buy in an auction scheduled for mid-2015, some U.S. senators said Tuesday.
Humavox this week unveiled Eterna, a new platform that uses RF signals to wirelessly power the Internet of Things, especially medical and wearable devices such as hearing aids, smart watches and augmented-reality glasses.
A third-party advertising framework integrated in hundreds of Android apps contains a vulnerability that could allow hackers to steal sensitive information from users' phones, according to security researchers from antivirus firm Bitdefender.
No matter how valiant the efforts of chief security officers, or how much businesses say they focus on securing their systems, or the amount of money spent on IT defenses -- many of the same IT security challenges persist.
Huddle's enterprise content collaboration suite now has a native component for creating, editing and sharing documents, an attempt by the company to reduce its customers' usage of Microsoft's Word and OneNote applications.
IT managers facing the task of explaining the business value of IT to the C-suite don't necessarily have an easy time of it. But eBay believes it has fixed this problem with a metric that translates IT resources into key business metrics
Oracle is now a corporate sponsor of the OpenStack Foundation and plans to weave parts of the open-source infrastructure platform into its own products, saying it will give customers more flexibility and options for managing clouds.
Qualcomm and competitor MediaTek are working on chipsets that will open the door for LTE in low-cost smartphones and tablets, allowing people all over the world to benefit from the higher speeds it offers.
An industry consortium featuring some of the biggest names in technology – including Google, Microsoft, Facebook and Reddit – is urging the Obama Administration to support a major overhaul of laws governing electronic surveillance.
Hackers of likely Chinese origin infiltrated computers belonging to the foreign affairs ministries of five unnamed European countries ahead of the G20 Summit in September, according to security researchers at FireEye.
Symantec has downsized their Managed Security Services portfolio, ending support for the managed firewall and managed endpoint offerings. Symantec says the change is part of an effort to streamline things within the company's Information Security portfolio, but what does that mean for existing managed security customers?
The U.S. Department of Justice (DOJ) is investigating a report alleging that Dell computers have been sold to the Syrian regime despite the trade embargo in place, according to a July filing by Dell to the U.S.A Securities and Exchange Commission (SEC) that was made public this week.
A workers' rights group is demanding Apple investigate the recent deaths of several workers at an iPhone factory in China, one of whom was a 15-year-old who died of pneumonia after working at the facility for a month.
At a glance, the Yellow Jacket looks like any other iPhone case, albeit a little bulkier – another of the numberless hollow exoskeletons for the most recognizable smartphone on the market. Flipping a small cover at the top of the Yellow Jacket down, however, reveals the sharp prongs of a 650,000-Volt stun gun – making the case protective in more ways than one.
Rambus and Micron Technology said Monday the companies had signed a broad patent cross-license agreement, giving Micron the right to use any Rambus patent for the manufacture of specified integrated circuit products, including memories.
Trustwave's SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft's Internet Information Services (IIS) web-hosting software.
Microsoft has plugged a vulnerability in Microsoft Office 365 that would have let attackers grab user identities and steal email and documents, according to Adallom, the security vendor that says it discovered the problem.
Eight of the largest U.S. Internet companies are formally urging the White House and Congress to rein in surveillance by the National Security Agency, a move at least one privacy advocate says will add pressure on Congress to further restrict NSA activity.
A Russian-speaking group is advertising "bulletproof" hosting for cybercriminals from data centers in Syria and Lebanon, an apparent effort to place new services in locales where Western law enforcement has little influence.
Stop me if you've heard this one before: Hewlett-Packard released new "converged systems" on Monday that aim to get customers up and running quickly with virtualized applications and big-data analytics.
As Bitcoin's popularity grows, so does talk about its standing as legal tender, but there are lingering issues that need to be sorted out before people start using Bitcoin to buy everyday things, experts said on Monday.
These days, a signature-based approach to anti-virus and anti-malware measures simply isn't good enough. Most companies that develop anti-virus solutions realize that. But this hasn't always been the case, and at some point, somebody had to develop the foundation upon which so many security approaches are based today.
Politics collided with the world of technology this year as stories about U.S. government spying stirred angst both among the country's citizens and foreign governments, and the flawed HeathCare.gov site got American health-care reform off to a rocky start. Meanwhile, the post-PC era put aging tech giants under pressure to reinvent themselves. Here in no particular order are IDG News Service's picks for the top 10 tech stories of the year.
Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.
Internet services and other organizations hoping to plant a newsfeed on their Web sites, or aggregate their log files, could get a hand from a new pub/sub (publish-subscribe) messaging application called [Kafka, first developed by professional social networking service LinkedIn.
Microsoft has waffled over the past few days about how long it will continue to sell Windows 7, initially stating that it had already stopped shipping the operating system to retailers and OEMs, but shifting the status over the weekend to "to be determined."
Qualcomm has made its Gimbal sensors or "proximity beacons" commercially available as part of the company's context aware platform, which lets, for example, retailers see when a customer has entered a store.
In theory, cloud computing offers a fairly straightforward model for consuming compute and storage resources. Customers request capacity, it is provided by a vendor and it is paid for. Customers should be able to spin up and down resources as they need to and only pay for what they use.
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?
Global intellectual property (IP) legislation continues to be negotiated behind closed doors this week in Singapore where discussions are underway on a secretive international trade treaty that could have far-reaching effects on Internet services, copyright law and civil liberties.
Temperatures plunged everywhere in the U.S. last week but not in the iOSphere, where heated speculation and anticipation of the iPhone 6 being able to detect and recognize your face kept spirits buoyant. Though why remains a mystery.
AT&T wants to silence a shareholder proposal that it disclose the government requests it receives for customer information, rejecting a step that Google, Microsoft and other Internet companies have already taken.
The U.S. Defense Department may have found a new way to scan millions of lines of software code for vulnerabilities, namely by turning the practice into a set of video games and puzzles and have volunteers do the work.
The U.S. Federal Communications Commission will aim to conduct auctions to sell spectrum now held by television stations to mobile broadband providers in mid-2015, the chairman of the agency said Friday.
An estimated one in four user applications sent from the U.S. Department of Health and Human Services' HealthCare.gov to insurance providers have errors introduced by the website, including missing applications, an official with the agency said Friday.
About a month ago, Samsung reached out to see if I was interested in checking out its latest personal color printer, which happens to be NFC-enabled. I was. The company says the printer it sent, the Xpress C460FW, is the "world's first laser printer with NFC technology." I'm not so sure that's true, because a quick Google search turned up a number of other NFC-enabled printers from Brother and HP. Either way, it's the first NFC printer I've used.
The U.S. National Security Agency has been spying on Italian communications from installations on the roof of the U.S. Embassy in Rome and the country's consulate in Milan and even mounted an operation to capture information from inside the Italian embassy in Washington, D.C., the Italian weekly magazine L'Espresso claimed Friday.
The National Security Agency on Friday cited a 1981 executive order signed by then-President Ronald Reagan as the authority under which it is collecting location data daily from tens of millions of cell phones around the world.
The U.S. Supreme Court has agreed to hear a controversial software patent case after a federal appeals court ruled that an abstract idea is not patentable simply because it is tied to a computer system.
Thirteen people, including the creator of Blackhole, a popular exploit tool used to infect computers with malware, were arrested and charged in Russia with creating and participating in a criminal organization.
IBM is developing software that will allow organizations to use multiple cloud storage services interchangeably, reducing dependence on any single cloud vendor and ensuring that data remains available even during service outages.
U.S. securities regulators questioned an early version of Twitter's initial public offering prospectus that claimed the social media company was becoming more profitable when it was actually losing increasing amounts of money.
Get Daily News by Email
Sign up and receive the latest news, reviews and trends on your favorite technology topics.