News

security
internet of things

google primary

You don’t know Docs from Drive: Google’s productivity apps, explained

Docs or Drive? Apps for Business or Drive for Work? Follow our guide to determine which Google service offers what, and which one is best for you.

Python bumps off Java as top learning language

Eight out of the top 10 universities now use Python to introduce programming, a researcher has found

hybrid cloud

This is what the new hybrid cloud looks like

Hybrid cloud management is really about managing the old and the new IT worlds.

Alcatel-Lucent HQ, Murray Hill, NJ

Deadline looms for $100K Bell Labs Prize

If you want a shot at the $100K Bell Labs Prize, you'd better hurry up and put some polish on that great idea: The deadline is July 15.

windows 9

Russian Windows leaker denies link to ex-Microsoft worker who stole trade secrets

But Wzor acknowledges that the case prompted move to go underground and break off communication with sources

Microsoft's IE steps back from the brink of irrelevance

Beats the odds, and reverses some of the massive declines of 2005-2011

What vacation? Expect to work while you're away

The situation's getting worse for some, but many CIOs are aware and are doing what they can to mitigate it.

IBM rethinking decades-old computer design with $3 billion investment

IBM is also looking ahead at a world in which computer chips don't have silicon

Google, Dropbox band together to fight patent trolls

A new group seeks to provide its members insulation against attacks by patent trolls

Microsoft says new hybrid storage options can cut costs up to 60%

Microsoft Azure StorSimple storage options mix on premises with cloud resources.

Polycom WebRTC diagram

How WebRTC Is Making Enterprise Inroads

The open source standard for browser-based real-time communication, known as WebRTC, is beginning to take root in call centers and other environments where users need quick access to voice, text and video communication capabilities....

malware

Blackshades RAT analysis finds key to popularity

An analysis of the notorious Blackshades remote administration tool, which was at the center of a global criminal network, found the toolkit rich in features bound to attract nontechnical criminals.

Obama has big options for green card, H-1B reform without Congress

He could make changes to the system that would shape how it works and how many visas are available

Defensive tactics against sophisticated cyberspies

Aligning security systems with intelligence gathered on groups of elite hackers working for nation states is a key defense for targeted organizations, experts say.

Cisco mulling membership in Google, Microsoft Ethernet group

25 Gigabit Ethernet Consortium formed with Arista, Broadcom and Mellanox for faster development of lower cost/gigabit data center links.

Data Security

How the Target Breach Has Affected Small Business Data Security

Data breaches continue to plague large retailers, but that doesn't mean small businesses are immune. In fact, hackers increasingly target small firms as a way to get to the big guys. Here's what companies need to do to step up their...

Scammers want to wreck your business, vacation travel

FTC, FBI warn of unwanted travel companions: scammers, fraudsters.

Thieves steal 40,000 gadgets from Samsung factory in Brazil

A multi-million-dollar robbery sees truckloads of phones, tablets and laptops stolen.

Load More