IT

Developers have patched a vulnerability in Sudo, a core command utility for Linux, that could allow a user to execute commands as a root user even if that root access was specifically disallowed. The patch prevents potential serious consequences within Linux systems. However, the Sudo vulnerability ...

Since the dawn of the Internet age, criminals have looked for ways to profit on unsuspecting people while they browse the Web. Viruses, malware and other schemes were invented to infect and infiltrate systems, both at the enterprise and consumer levels. One of the most successful forms of cybercrime...

Stopping cyberattacks requires diligent behavior. One of the themes of this year's National Cyber Security Awareness Month, or NCSAM, is that all computer users should take steps to Secure IT. That means shaking up the passphrase protocol by using not just strong passwords but strong and unique pass...

Two things to avoid in online discussions are politics and religion. Open source technology may be an explosive third topic that software developers should be wary of subjecting to a virtual debate. Automattic CEO Matt Mullenweg and Ruby on Rails creator and Basecamp cofounder David Heinemeier Hanss...

ANALYSIS

Tackling Economic Security Governance

If you've ever played chess, you know that each move you make has to be the best move. At one level, this is painfully obvious -- after all, who would choose to make a terrible move instead of a better one? -- but it's illustrative of an important concept. Specifically, the core reason it's true is...

I don't see how you can operate a modern application development shop without a platform. Many vendors, if not most, offer a platform or platform-like environment, and a new approach to development, called "DevOps," has been percolating in the information technology space.

Cybersecurity should be a concern for all businesses -- large and small. Cybersecurity also should be a concern for consumers, government agencies, and basically anyone who relies on the Internet in our increasingly connected world. However, far too many people still disregard the threats.

While open-source enthusiasts still await the year of the Linux desktop, hardware developer Pine64 is advancing the cause of a $25 Linux-powered smartwatch, dubbed "PineTime."

EXPERT ADVICE

Harnessing Data Lakes for E-Commerce Business Growth

There were 5,524 store closures in the U.S. alone last year. There is no doubt that the retail industry is moving to e-commerce. For mid-sized retail companies, this trend can be a major opportunity to gain market share in their local areas and continue to grow in an industry dominated by Amazon and...

OPINION

What’s Wrong With Apple?

Apple held its huge product announcement event last week, and what once had people besides themselves with excitement has become a near pointless program of copied features and missed expectations. It is a shame to watch -- much like it was when Apple fired Steve Jobs. It appears that the firm has f...

Users of a multi-cloud storage strategy may be twice as likely to face a security breach as those that use hybrid or single clouds, suggests a report from UK-based security specialist Nominet. Fifty-two percent of survey respondents who adopted a multi-cloud approach suffered a data breach over the ...

LINUX PICKS AND PANS

Drauger OS Makes a Capable Linux Game Console Platform

Drauger OS is a relatively new Linux distro for users with a penchant for games. Several design elements make this Linux gaming platform different from typical distributions that merely pack digital titles. However, it lacks a few productivity tools that otherwise would make it a daily computing dri...

A new collaboration between Dell and Google has produced the world's first enterprise-class Chromebook. The companies have announced their partnership to bring new capabilities and services to Dell's Unified Workspace strategy. Google launched its Chrome Enterprise capabilities in 2017 to put critic...

TECHNOLOGY LAW CORNER

Cloud Users: Read the Click Agreement Terms

There is no data showing how many people actually read through click agreements, terms of service and privacy policies before clicking the alluring "accept" button. However, there's research that indicates fewer than 1 percent of people report taking the time to review online terms. Most folks cons...

Technewsworld Channels