- Welcome Guest
- Sign In
Engaging in disaster recovery requires a company to think about many things, but despite the long checklists that are created to accomplish DR, there are some areas that frequently get overlooked in business continuity and disaster recovery planning. With this in mind, it is imperative to address al...
Lost customers and revenues are caused by password sharing and friction created at websites by onerous authentication procedures, according to a new report. The report explained that if accounts are being shared by multiple users, service providers are less likely to accurately monitor usage and are...
A report from the Information Technology & Innovation Foundation called on the U.S. government to take an active role in promoting industrial competitiveness, and to formulate an advanced industry and technology strategy, which should include a set of policies and programs explicitly designed to sup...
Pat Gelsinger's Intel is looking like the very different company it needs to be. It is more collaborative than combative, more strategic than tactical, with a far more effective plan than it has had since Andy Grove left the firm. Let's talk about how Gelsinger presents Intel as an execution and par...
Cloud cybersecurity -- or a lack of it -- is feeding a frenzy of companies out of the public cloud. A similar concern about managing compliance obligations is keeping organizations from moving to the cloud in general. However, much of the growing concerns over cloud cybersecurity result from experie...
Sourcegraph has launched an automated internal coding tool that allows enterprises to automate and track large-scale code changes across all repositories and code hosts. The new tool, called Batch Changes, also provides developers and enterprises ways to manage the resulting change sets through che...
Creating a smooth functioning interface for smart glasses that allows its wearers to operate in an augmented reality world has proven to be a challenging task, but Facebook believes it may have a solution on the human wrist. It's a comfortable location for all-day wear, Facebook noted. It's located ...
Nearly one-in-five rural Americans don't have broadband Internet access, but that could change with the use of carefully targeted subsidies through a process known as a reverse auction. A big, one-time capital expenditure administered through a reverse-auction program would attract larger, more effi...
Nvidia is in the process of working through regulatory approvals to buy Arm from SoftBank -- a technology holding company with mixed success husbanding its acquisitions. Let's explore this acquisition, the most significant regulatory hurdles the effort needs to overcome, and what might result once t...
The most vulnerable cybercrime victims are young adults and adults over 75, according to the latest research revealed in the LexisNexis Risk Solutions biannual Cybercrime Report. The report reveals how unprecedented global change in 2020 created new opportunities for cybercriminals around the world,...
Malicious online actors used email as their prime vehicle for delivering malware to their victims in the last quarter of 2020. The HP-Bromium Threat Insights Report found that 88 percent of malware was delivered by email into its targets' inboxes, many times evading measures at email gateways to fi...
Globally, we throw out 50 million tons of electronics waste every year, which is the equivalent of 1,000 laptops every second. This month the EU addressed this problem with a comprehensive "right to repair" law to dramatically reduce this waste. Let's explore electrical hardware sustainability issue...
Microsoft on Monday reported that multiple malicious actors were taking advantage of vulnerabilities in its Exchange software last week to attack systems at organizations that have failed to patch the flaws. The company attributed the attacks "with high confidence" to Hafnium, a group believed to be...
Skeptics of giving computers control over high-risk activities like driving cars were given some ammunition last week when researchers at OpenAI discovered their two-month-old machine vision system could be tricked with a pen and paper into misidentifying objects. For example, their new system coul...