19% of shoppers would abandon a retailer that’s been hacked
Nearly a fifth of shoppers would avoid at a retailer that has been a victim of a cybersecurity hack, according to a survey.
Читать дальше...
Nearly a fifth of shoppers would avoid at a retailer that has been a victim of a cybersecurity hack, according to a survey.
Читать дальше...
It's not surprising that network and security teams aren't always on the same page. After all, networks need to be fast and efficient, while security is about slowing things down and implementing extra steps to help meet security measures.
Читать дальше...
Researchers have demonstrated the ability to 3D print objects that can then change shape, even folding and unfolding, when heated through an electrical current or with ambient air temperature.
Читать дальше...
Auto technology suppliers Delphi Automotive and Mobileye today announced a partnership to co-develop what they described as the market's first turnkey fully autonomous driving system for automakers.
Читать дальше...
Let's face it, a data breach at your organization seems inevitable. And the response should be managed "in such a way as to limit damage, increase the confidence of external stakeholders, and reduce recovery time and costs," according to a Harvard Business Review article.
Читать дальше...
Buying an autonomous car may be in your future, but make sure it has a capable processor installed so the vehicle doesn't get in trouble with traffic police.
Читать дальше...
I never knew it was possible for so many people to be excited about Nougat.
Читать дальше...
One of my readers, Sam Medina, asked me for some ideas on iPad storage today. I’ve put together a few ideas.
Читать дальше...
File synchronization and sharing vendor Huddle is today announcing enhanced security for external collaboration. While only a moderately interesting announcement in and of itself, it comes at an interesting time for the broader enterprise file sharing and sync (EFSS) space.
Читать дальше...
For more than 15 years, Gary Smith has been at the helm of Ciena, leading the company through the so-called ‘telecom nuclear winter’ following the early 2000s dot-com bust to its global leadership position today in the optical networking and metro Ethernet markets. In this installment of the IDG CEO Interview Series, Smith talked with Chief Content Officer John Gallant about Ciena’s expanding enterprise business, including its data center connectivity strategy. He also discussed how Ciena is... Читать дальше...
Some of you may remember the TV game show The Weakest Link, during which a somewhat caustic Anne Robinson would declare one of the nine contestants the weakest link, and summarily kick them off the program.
Читать дальше...
I first noticed the difference when tiny white flakes floated across the screen.
Читать дальше...
The Cambridge SoundWorks OontZ Angle 3 Next Generation Ultra Portable Wireless Bluetooth Speaker currently averages 4.5 out of 5 stars from over 8,300 people on Amazon (read reviews). It's regular list price is $99.99, but with the current 72% discount you can get it for just $27.99. The OontZ Angle 3 connects effortlessly to your device via bluetooth. It is designed to be loud and clear, with rich bass delivered through their proprietary passive subwoofer design. IPX5 water resistance makes the unit splashproof... Читать дальше...
My all-time favorite comment on rising expectations in technology was from stand-up comedian Louis C.K., I think it was on the Conan O’Brien show, talking about the fact that no matter how amazing technology gets, people still don’t think it’s good enough. So Louis’ story was: he’s sitting next to a guy who’s getting all huffy and impatient about a couple of seconds delay on his smart phone connection. Louis’ comment: “Hey man, give it a second – it’s going to space!”
Читать дальше...
Security rules the day in version 10 of Nginx's enterprise-level web server, which features enhancements, including a web application firewall.
Читать дальше...
MIT researchers have found a way to transfer wireless data using a smartphone at a speed about three times faster and twice as far as existing technology.
Читать дальше...
It’s been a good year for IT administrators who want more information, more often, about what’s happening on their networks.
Читать дальше...
Graphics processors with Nvidia's NVLink throughput technology have just started coming out, but a successor to the groundbreaking interconnect is already on its way.
Читать дальше...
Microsoft yesterday released 64-bit versions of its Office 2016 applications for the Mac, following a series of previews offered testers since April.
Читать дальше...
Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales in the black market when they leaked valuable cyberweapons allegedly stolen from the U.S. National Security Agency.
Читать дальше...
IBM's Power processors have a storied history; they were notably used in the Watson supercomputer that outsmarted humans in the game of Jeopardy! in 2011. The latest chip in the family, called the Power9, is coming next year, and it stands out for its blazing speed and for technologies never seen in chips before.
Читать дальше...New security challenges
Image by Les Haines
When migrating to a cloud-based environment, companies need to take a hard look at their needs and the security of their providers, as well as their own internal policies. Many companies don’t take time to consider the risks of simply sharing cloud space with other organizations, for example, or how to match cloud security policies to those of the data center.
To read this article in full or to leave a comment, please click here
What if robots could be powered by light instead of bulky battery packs or movement-limiting power cables?
Читать дальше...
Eighty-two years ago this month, The New York Times published an article commenting upon the 20-year “Grand Canyon of History” separating the leaders of 1914 from the then-contemporary leaders of 1934. The general question was how leaders of one era differ from those of another. That interesting exercise gave rise in my mind to a two-part variation: How did the leaders of 20 years ago differ from those of today, and how will the leaders of two decades from now be different from those who lead today? Читать дальше...
Civil liberties and tech advocacy groups have opposed a move by the Department of Homeland Security to collect social media information from certain categories of visitors to the U.S.
Читать дальше...