Search

Results 541-560 of 828 for Jack M. Germain.

WiFi Routers Riddled With Holes: Report

Most WiFi router vendors have not patched numerous firmware vulnerabilities discovered more than two years ago, according to a report released Tuesday. OEM firmware built into WiFi routers use open source components that contain numerous known security vulnerabilities that can be exploited by hacker...

Skype Comes to Linux in a Snap

Canonical has announced the availability of Skype as a Snap file, the universal Linux app packaging format. The release means that Skype can deliver its communication service to a wider range of Linux users, not just those who run Canonical's Ubuntu Linux distribution.

Free Linux Tool Monitors Systems for Meltdown Attacks

SentinelOne has released Blacksmith, a free Linux tool that can detect Meltdown vulnerability exploitation attempts. The company has been working on a similar tool to detect Spectre vulnerability attacks. Though free, Blacksmith is not open source. SentinelOne decided to expedite its development in-...

Barcelona Opts for Breath of Open Source Fresh Air

Barcelona city officials have voted to shut the door on Microsoft Windows in favor of the Linux operating system and open source technology. The city hopes to save money from proprietary software license fees and to build a specialized library of open source applications targeting the needs of gover...

Massive Intel Chip Security Flaw Threatens Computers

A design flaw in all Intel chips produced in the last decade is responsible for a vulnerability that puts Linux, Windows and macOS-powered computers at risk, according to multiple press reports. The flaw reportedly is in the kernel that controls the chip performance, allowing commonly used programs ...

Google Joins Effort to Stop Zika Virus Spread

Google last week announced it would contribute $1 million to the UN Children's Fund to support the global fight against the mosquito-borne Zika virus. A team of Google engineers has volunteered to work with UNICEF to analyze data in an effort to figure out the viral infection's path. It also will ma...

Cryptography Pioneers Win Million-Dollar Turing Award

The Association of Computing Machinery on Tuesday named Whitfield Diffie and Martin E. Hellman recipients of the 2015 ACM A.M. Turing Award for their contributions to modern cryptography. Their invention of public key cryptography and digital signatures revolutionized computer security, the organiza...

Chicago School Board Elevates Computer Science to Graduation Requirement

The Chicago Board of Education on Wednesday voted unanimously to make computer science a graduation requirement for all high school students beginning with next year's freshmen. Chicago Public Schools has become a national leader in computer science education since Mayor Rahm Emanuel launched the Co...

Greenwave Brings Unity to IoT Networks

Greenwave Systems on Monday announced the expansion of its AXON Platform to unite mobile machine-to-machine and residential IoT networks into one fully manageable network service. Mobile carriers, telecommunications operators and service providers can use AXON for Mobile IoT to integrate a variety o...

T-Mobile Wins OpenSignal Speed Tests

T-Mobile's 700-MHz rollout has given its mobile users some of the fastest data speeds in the U.S. market, according to a report OpenSignal released Tuesday. OpenSignal crowdsources data on carrier signal quality from users who have its consumer mobile application installed. T-Mobile has the fastest ...

The Rich Get Internet-Richer While the Poor Get None

Efforts to increase Internet access worldwide are falling short of targeted goals, according to a United Nations Broadband Commission report released earlier this week. More than half the world's population is still offline, according to the report, and growth in the number of people with access t...

Exploding Chip Could Thwart Cyberthieves

Researchers at Xerox PARC have developed a self-destructing mechanism for microchips embedded on a hardened glass surface. The glass can self-destruct upon command and could be used to secure personal data such as health and banking records. It also can be used to destroy encryption keys stored on m...

Sauce Labs’ Automated Mobile App Testing Gets Real

Sauce Labs on Tuesday announced the release of its automated mobile testing solution for real devices. The new option lets developers test mobile applications directly on the devices that will run them. About 80 percent of software and application testing is performed manually. Automated testing on ...

Obama Lauds STEM Progress at White House Science Fair

President Obama on Monday announced $240 million in new pledges from private businesses, schools and foundations across the country for STEM -- science, technology, engineering and math -- education. The president also announced that a national goal set four years ago to provide 98 percent of Americ...

Google Puts Blogger Porn Under Wraps

Google will place a privacy curtain around sexually explicit images and video on its Blogger platform if users fail to remove the content of their own volition. Google has begun notifying Blogger subscribers about the policy change affecting adult content. The ban targets images and video that are s...

IT Job Seekers Back in the Driver’s Seat

Fast-paced growth in the IT industry and low unemployment rates for tech workers are making it difficult for corporate executives to find qualified hires. Add to that a bullish frenzy of investor support and corporate acquisitions as key factors driving the continued growth of the technology industr...

‘Smart Spaces’ Project Seeks to Light Up Networks

Dartmouth University researchers are shining a new light on using "smart spaces" in ambient room lighting to transmit both data and human gestures. The three-month-old research pushes the envelope beyond advancements already made by researchers in the UK, at the University of Edinberg. The integrate...

Acer Designs Chromebooks for Students’ Rough Handling

Acer on Wednesday announced two new ruggedized Chromebooks geared for classroom use. Both will go on sale in February. The Acer Chromebook C910 and C740 have a durable design built around reinforced covers and hinges. The new models support multiple user sign-ons and offline file access. Security fe...

FDA Aims to Shore Up Medical Device Cybersecurity

The Food and Drug Administration last week released long-awaited recommendations aimed at better managing cybersecurity risks to protect patient health and information in a document titled "Content of Premarket Submissions for Management of Cybersecurity in Medical Devices." The new standards recomm...

BOOK REVIEW

‘Data Divination: Big Data Strategies’ Is a Great Hip-Pocket Tool

Most of today's books about Big Data delve into highly technical tools, cloud technology, and high-level computer-assisted math calculations and algorithms. For most people in the business world, this is far from motivating readers to appreciate just what Big Data does and how to let it get you ther...

Technewsworld Channels