- Welcome Guest
- Sign In
During the last few weeks we’ve had two developers conferences. First, there was Microsoft Build, and last week was Apple’s WWDC. I think both approaches to the developers conferences showcase the strengths and weaknesses of both companies, so I figured it would be fun to talk about those differ...
The KYY 15.6-inch portable monitor is a classy and functional portable monitor that works well while traveling or as a permanent second monitor for home and office use.
Ransomware is the top supply chain risk facing organizations today, according to a new survey by ISACA, an association for IT professionals with 140,000 members in 180 countries. The survey, based on responses from more than 1,300 IT pros with supply chain insights, found that 73% of the respondents...
Apple’s 2022 Worldwide Developers Conference on Monday revealed the company’s latest versions of its mobile and desktop operating systems at the kickoff of its annual week-long virtual high-tech show targeting developers and the Apple consumer experience.
What does it mean for Facebook when the adult leaves the table, and the unprepared CEO then has nothing to turn him toward a less risky path? Let’s discuss that this week.
We spoke with Bigeye Co-Founder and CEO Kyle Kirwan about how his company’s data sniffing platform brings together data engineers, analysts, scientists, and stakeholders, to build trust in data.
A “Zero Day” vulnerability in a Windows tool that hackers have been exploiting through poisoned Word documents has been discovered. Microsoft officially recognized the vulnerability and issued workarounds to mitigate the flaw.
Government organizations and educational institutions, in particular, are increasingly in hackers’ crosshairs as severe web vulnerabilities spiral upward. Remote code execution, cross-site scripting, and SQL injection are all top software offenders.
Microsoft held its latest Build event last week and I’m pretty sure it caused most of the PC OEMs to freak out. This is because Microsoft announced a new focused workstation for developers called Project Volterra.
Is your company's data is clean and well managed? Why does that matter anyway? Ataccama VP David Kolinek discusses the challenges and solutions related to the formal management of data assets within an organization.
The security and operations analytics SaaS company hopes to disrupt legacy security ops with an artificial intelligence-driven approach to security operations built into its Resolution Intelligence platform.
Last week was BlackBerry’s annual analyst summit. Since BlackBerry’s tools and QNX operating system are expected to be heavily used in the next generation of cars, this event often provides a view into the future of automobiles.
To give back to computer science education in a small way, I'd like to share my observations about determining the quality of instructional resources. Hopefully, those of you treading a similar path will learn the easy way what I learned the hard way.
The director of cybersecurity at the National Security Agency induced a few smirks among cyber pros last week when he said there wouldn’t be any backdoors in the new encryption standards his agency is working on with the National Institute of Standards and Technology.