- Welcome Guest
- Sign In
Engaging in disaster recovery requires a company to think about many things, but despite the long checklists that are created to accomplish DR, there are some areas that frequently get overlooked in business continuity and disaster recovery planning. With this in mind, it is imperative to address al...
MakuluLinux is an unusually creative operating system that developer Jacque Montague Raymer is constantly changing with each major upgrade. Some of these changes are radical and innovative. Trust me on this point. I have had my hands on so many Linux varieties that the really good ones are in a leag...
Pat Gelsinger's Intel is looking like the very different company it needs to be. It is more collaborative than combative, more strategic than tactical, with a far more effective plan than it has had since Andy Grove left the firm. Let's talk about how Gelsinger presents Intel as an execution and par...
Cloud cybersecurity -- or a lack of it -- is feeding a frenzy of companies out of the public cloud. A similar concern about managing compliance obligations is keeping organizations from moving to the cloud in general. However, much of the growing concerns over cloud cybersecurity result from experie...
Sourcegraph has launched an automated internal coding tool that allows enterprises to automate and track large-scale code changes across all repositories and code hosts. The new tool, called Batch Changes, also provides developers and enterprises ways to manage the resulting change sets through che...
A cadre of tech giants have created the Rust Foundation. This is neither the first nor largest contribution to an open-source project by private tech vendors. Still, the creation of this new body marks another noteworthy instance in which proprietary software companies took the initiative to found a...
A testament to the rising adoption of open source is the recent moves by software giants such as Microsoft, IBM, and Oracle into the open-source community. This corporate migration to open source is continuing as many organizations, both large and small, turn to open source in tough economic times.
Malicious online actors used email as their prime vehicle for delivering malware to their victims in the last quarter of 2020. The HP-Bromium Threat Insights Report found that 88 percent of malware was delivered by email into its targets' inboxes, many times evading measures at email gateways to fi...
For multichannel video programming distributors to stay competitive, they need to offer multichannel video programming solutions that are not only innovative but user friendly. Smart TV manufacturers need to reduce time to market and provide flexible services. Each can bridge the gap by leveraging R...
In a recent Linux Foundation blog post titled "Preventing Supply Chain Attacks like SolarWinds," the foundation's Director of Open Source Supply Chain Security, David A. Wheeler, adamantly pushed the need for software developers to embrace the LF's security recommendations. Given the magnitude of th...
Desktop as a Service provider Shells offers a new component to virtual cloud computing. It brings Linux distros and Windows 10 to any computer, mobile device, and some game consoles, via any Web browser. The U.S.-based startup went online in the first quarter of last year. Since then, CEO and founde...
Cybersecurity experts predict that in 2021 there will be a cyberattack incident every 11 seconds. This is nearly twice what it was in 2019, and four times the rate five years ago in 2016. The rapidly growing increase in cyberattacks worldwide comes at a hefty cost for businesses in order to better p...
I participated in a group analyst event several weeks ago about companies converting their offices into collections of meeting rooms. We couldn't picture people who have been meeting remotely for so many months suddenly concluding that the long commute to and from the office was worth meeting in per...
Cyberattacks are increasing in frequency, ramping up the data privacy threats they pose to government agencies and businesses alike. Governments both domestic and foreign need to step up efforts to pass legislation that bolsters technological defenses this year, warn privacy groups. Stiffer privacy ...