You will notice bigger photos in your Facebook news feed over the coming weeks, but the layout and navigation of the site remain untouched. A massive redesign envisioned by top brass at the company was mostly scrubbed to indulge the lowest common denominator.
The U.S. Federal Communications Commission should move forward with a plan to open up new 5GHz spectrum to Wi-Fi as consumer demand for wireless bandwidth skyrockets, a member of the commission said Friday.
With robots becoming increasingly powerful, intelligent and autonomous, a scientist at Rensselaer Polytechnic Institute says it's time to start making sure they know the difference between good and evil.
Thanks to blockbuster acquisitions such as Facebook's $19 billion purchase of WhatsApp, successful IPOs and a healthy environment for startups, the entrepreneurial spirit is alive again in the Silicon Valley.
The iOSphere overflowed with gratitude for the monumental failure, the colossal collapse, the flop, the fiasco, the disaster of the iPhone 5C because it has finally convinced Apple to give the iPhone 6 a screen larger than four inches.
Last week, Salesforce.com reported its fourth-quarter and year-end fiscal 2014 results, announcing a major bump in revenue and even raising its guidance significantly. But the fast-growing cloud vendor is also continuing to post significant losses as it spends big on sales, marketing and acquisitions.
The first Cebit trade show in the post-Snowden era will focus on security, showing off locally developed bug-proof phones and messaging systems, as well as the ability to protect mobile devices using smartcards.
Automation, virtualization, cloud computing -- these technology trends are transforming the data center and enabling companies to lower costs, increase flexibility and improve reliability. However, these shifts require IT, and their outsourcing providers, to rethink traditional strategies.
Research pointing to rising criminality on Tor shows the cost of having a network that provides anonymity to whistleblowers, journalists, political dissidents and others trying to avoid government surveillance.
Microsoft has launched a new website to "tell the untold story" of something it believes changed the history of Windows security and indeed Microsoft itself a the Software Development Lifecycle or plain 'SDL' for short.
HP was the first IT vendor out of the gate with its analyst-only event. CIO.com columnist Rob Enderle was there to grade HP on five metrics and see how the company stacks up to IBM, EMC and Dell -- all of which know a thing or two about successful industry analyst events.
The U.S. Federal Aviation Administration's policy regarding the commercial use of drones, based on a 2007 policy statement, "cannot be considered as establishing a rule or enforceable regulation," an administrative law judge ruled Thursday.
Newsweek made waves this week with an article that claims to unmask Satoshi Nakamoto, the previously anonymous person whose name was the only one listed on the 2008 whitepaper that launched the modern cryptocurrency movement.
Microsoft will deliver five security updates to customers next week, two tagged as "critical," including one that will quash the open vulnerability in Internet Explorer that hackers have been exploiting since January.
In today's network environments, malware that evades legacy defenses is pervasive, with communication and activity occurring up to once every three minutes. Unfortunately, most of this activity is inconsequential to the business. You would think that would be good news right? The problem is that incident responders have no good way of distinguishing inconsequential malware from (potentially) highly damaging malware. As a result, they spend way too much time and resources chasing red herrings while truly malicious activity slips past.
There are many reasons why The Container Store, a Coppell, Texas-based retailer of storage systems and accessories, has made Fortune Magazine's list of "100 Best Companies to Work For" the past 15 years.
The U.S. Federal Trade Commission should investigate Facebook's proposed US$19 billion acquisition of mobile messaging app WhatsApp -- and possibly block it -- because of the potential impact on users' privacy, two privacy groups said in a complaint filed Thursday.
Strategically leaking information about upcoming smartphones and tablets to the press is a favorite way for manufacturers to create buzz around their products without having to spoil everything in an official reveal. This has been your tech marketing tip of the day, thank you, you've been a lovely audience.
An updated Apple whitepaper on iOS security delves into an unprecedented amount of detail about the security architecture and features of the company's mobile OS for devices such as the iPhone and iPad. Security professionals and IT consultants are praising both the company's transparency and its approach to protecting iOS devices, Internet security and users' data.
Malware often does strange things, but this one -- which looked like Skype installed on a corporate domain controller -- was most "peculiar," says Jim Butterworth, a security expert at ManTech International, whose security subsidiary HBGary recently found the custom-designed remote-access Trojan on a customer's network.
The figures released by the European Patent Office (EPO) on Thursday paint a grim picture of the European Union IT sector, but it also showed that some of the so-called global tech giants are not leading the way in innovation.
Organizations can now add machine-generated data to their palate of information sources that can be aggregated and analyzed, thanks to a new connector jointly developed by Tableau Software, a provider of business intelligence software, and Splunk, which sells a log-file search engine.
A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market, paving the way for cheap and easy development of sophisticated Android malware.
There are a lot of big names in the public cloud computing market: Amazon Web Services, Google, Microsoft, Verizon and Rackspace among them. And here's another company that's looking to make that list one day: Digital Ocean.
French mobile operator SFR is the target of a bidding war between construction giant Bouygues, which hopes to merge the network with that of its own Bouygues Telecom subsidiary, and Altice, owner of French ISP and cable TV company NumA(c)ricable.
Telecom operators Deutsche Telekom and Orange's latest results were negatively impacted by tough competition on fixed as well as mobile networks, but cost cuts and mobile data partly helped of offset that.
ICSA Labs, an independent division of Verizon, is now the largest government-approved EHR testing and certification body. The organization has aspirations beyond meaningful use, though, and hopes to drive healthcare IT vendors toward interoperability and innovation.
Cisco Systems released new firmware versions for some of its small business routers and wireless LAN controllers in order to address vulnerabilities that could allow remote attackers to compromise the vulnerable devices or affect their availability.
Not all are fans of Lenovo's recent plan to buy IBM's x86 server business. Since Monday, close to 1,000 workers at an IBM factory in China have been protesting the proposed acquisition, fearing they may lose their jobs if the deal goes through.
Goldman Sachs has been doing SDNs for a long time. It just wasn't called SDNs when the investment giant invested in network programmability. It was just a bunch of APIs, software development kits and other code used to cobble together a large number of various specialized networks – trading, investment banking and the like -- across the globe.
The Linux Foundation will offer a Linux development course on edX, the massive open online course (MOOC) platform developed by the Massachusetts Institute of Technology and Harvard University. The move is part of an edX effort, announced Thursday, to expand its course offerings to include content from nonacademic institutions. All edX content previously came from the nonprofit's 32 member schools, which include the University of California, Berkeley; Dartmouth College and McGill University.
Yahoo has acquired Vizify, a company that turns social media data into interactive visual aids such as infographics and videos, adding to the Internet giant's string of acquisitions designed both to get talent and access to new technologies and services.
Metadata has had a bad rap lately, with disclosures tying its collection to government spying programs. But those bits of information lurking behind our phone calls, photos and online chats can be useful in other ways if they're harnessed properly.
Having lots of Wi-Fi networks packed into a condominium or apartment building can hurt everyone's wireless performance, but Stanford University researchers say they've found a way to turn crowding into an advantage.
Plenty of people have engineering degrees but not many have one specific to data centers. A university in Dallas is offering what it says will be a first-of-its-kind graduate degree in data center engineering.
Cisco executives in a roundtable session with reporters this week addressed the industry’s memory component degradation issue in products developed between 2005 and 2010. Cisco’s taking a $655 million charge to address remediation actions customers are taking to replace products that include the defective memory components.
Once upon a time, Microsoft was the favorite target of malware developers. As Microsoft improved the defenses in its software, though, cybercrooks moved on to easier pickings. Adobe was a prime target for a while, but Adobe followed Microsoft's lead and made its software more secure as well. According to data from the 2014 IBM X-Force Threat Intelligence Quarterly Report, the favorite target is now Java.
The Khan Academy will offer SAT test prep materials for free, the online learning platform said Wednesday, through a partnership with the College Board that aims to help level the playing field in a college admissions process that has increasingly favored wealthier applicants.
Last week, Saugatuck Research released an analysis of IBM's new BlueMix offering. In introducing BlueMix, IBM announced its intention to invest $1 billion in application-oriented initiatives, including a commitment to CloudFoundry and making technologies such as the venerable application server WebSphere available as an online offering. The always insightful Lydia Leong from Gartner weighed in; she's obviously impressed by BlueMix.
What if one day you accidentally step on your smartphone and instead of it shattering, it simply bends? Research underway at the Los Alamos National Lab could give consumers more durable smartphones, tablets and laptops.
Phil Cummings says network firewalls will continue to be a critical piece of Health Information Technology Services -- Nova Scotia security portfolio for one simple reason: nothing's come along to replace them.
A government watchdog group tasked with overseeing whether actions the President's executive office takes to combat terrorism don't throw civil liberties overboard in the process is taking aim at the National Security Agency's "PRISM" data-collection surveillance program.
SAP is introducing a set of new subscription pricing options for its Hana in-memory cloud computing platform, in a move that falls in step with the pay-as-you-go model common in the cloud computing industry.
Macworld's Dan Moren offers a reason to be optimistic about the future of Apple's new CarPlay in-car, iPhone user interface after its less-than-enthusiastic reception: Apple's expertise in developing and updating software.
Facebook on Wednesday announced a set of new restrictions designed to curb the illegal sale of guns and other restricted items on its site, a phenomenon that had become vexing problem for the social network.
Hackers found security weaknesses that allowed them to overdraw accounts with Flexcoin and Poloniex, two websites that facilitate bitcoin transactions, and exploited them to steal bitcoins from the two services. The attacks put Flexcoin out of business and cost Poloniex's users 12.3 percent of their bitcoins.
As it works on its much-anticipated version of Office for touch interfaces, Microsoft envisions building on what it calls "natural interaction" technologies like digital ink and voice recognition, according to a company official.