Free Download: Get the April 2015 Comprehensive Internet Security Threat Report
Welcome Guest | Sign In
TechNewsWorld.com
Performance Matters: 9 Key Consumer Insights
Subscribed 2015
May 27, 2015
There is no better company to look at to get a sense of the future of technology in business and society than Zuora. This might surprise many people, because companies like Oracle, Microsoft and Salesforce might come to mind more readily. To one degree or another, those companies feature their products and services, which are very important, but Zuora talks about business models.
Putting the EU's E-Commerce Puzzle Together
May 27, 2015
A substantial number of Europeans shop online, but few make purchases outside their own country. The European Commission aims to change that through a broad initiative to create a Digital Single Market for the European Union, announced earlier this month. One of the 16 steps the EC has taken toward achieving that goal is undertaking an antitrust investigation of the e-commerce sector.
Hush! Everybody's Listening!
May 27, 2015
Americans have been spied on by their own government for far longer than most realized, it turns out, and the United States National Security Agency's surveillance activities are just the tip of the iceberg. The FBI, which repeatedly has expressed dismay at Google and Apple securing their mobile OSes reportedly has become a major player in administering the NSA's warrantless surveillance program.
Are Feds Losing the Cybersecurity Fight?
May 27, 2015
U.S. government agencies have invested time, effort and significant funding in the last several years to meet the challenges of cybersecurity threats, but the payoff has been disappointing, according to a report from the ISC2 Foundation. As part of its seventh Global Information Security Workforce Study, the foundation included a section that involved a survey of 1,800 federal IT professionals.
Charter, TWC Merger Could Be Fine With Feds
May 26, 2015
Charter Communications on Tuesday announced a deal to acquire and merge with Time Warner Cable, and also reaffirmed its commitment to buy Bright House Networks. The $56 billion cash-and-stock acquisition, if regulators give it a nod, will result in a merger of Charter Communications and Time Warner Cable under a new parent company called "New Charter." The deal values TWC at $78.7 billion.
Spy Agencies Planned to Corrupt Google Play
May 22, 2015
The United States and its leading Western allies, known as the "Five Eyes," reportedly planned to hack into smartphones through their links to Google and Samsung's app stores. They wanted to infect apps with spyware and find ways to send misinformation to targets, according to documents released to the media by National Security Agency whistle-blower Edward Snowden.
Americans Hate Surveillance, Love Privacy: Report
May 21, 2015
Americans are deeply troubled by surveillance, data collection and the security of their data that's held by government agencies and private companies. The combined results of two Pew surveys suggest that the vast majority consider it important to be in control of their information. Eighty-eight percent of the respondents didn't want someone to watch or listen to them without their permission.
Xactly: From Transaction to Process
May 20, 2015
It is subtle, but in the spring conferences I see a pattern emerging around the importance of process. Admittedly, my analysis in this case is less than scientific, and I have no statistics to support my idea, but I my instinct says a trend toward process is beginning. Two conferences that support my contention include Xactly and Zuora, both of which are taking place this week in San Francisco.
Russia Aims to Build US-Free Mobile OS
May 20, 2015
Russia wants to develop alternatives to proprietary or partly closed mobile operating systems by using open source tools as a foundation, Minister of Telecom and Mass Communications Nikolay Nikiforov said last week. "Success would make a fairly significant impact on the go-to market plans of numerous IT vendors," said Charles King, principal analyst at Pund-IT.
DoJ Calls On Private Sector to Strengthen Cybersecurity
May 20, 2015
The Justice Department is stepping up its program to engage more actively with the private sector on dealing with cybercrime and cybersecurity breaches. "We in government know that we cannot go it alone in fighting cybercrime. We need a strong partnership with you in the private sector," Assistant Attorney General Leslie Caldwell said at a recent Cybersecurity Industry Roundtable.
Venom Less Toxic Than Heartbleed
May 20, 2015
It was a little over a year ago that the Heartbleed bug shocked the Internet with its potential for mischief. Now another flaw in open source code has sent network administrators into damage control mode. The bug, called "Venom" for "Virtualized Environment Neglected Operations Manipulation," allows an intruder to jump out of a virtual machine and execute malicious code on its host.
Researcher's Airplane-Hacking Claims May Not Fly
May 19, 2015
A security researcher who last month bragged he'd hacked into a passenger jet's internal computer systems while in flight appears to have performed the act more than a dozen times over a three-year period. Chris Roberts, founder and CTO of One World Labs, told FBI investigators earlier this year that he'd hacked into the flight systems of commercial passenger aircraft from 15-20 times.
Redesigning Products and Services for the Internet of Things
May 15, 2015
Nearly everyone agrees the Internet of Things will create unprecedented business opportunities that will dramatically change the way almost every industry operates. There is also universal agreement that the IoT will force organizations to rethink the fundamental nature of their products and services. One company that has become a leader in the rapidly evolving IoT market is PTC.
Venom Vulnerability Could Violate Virtual Machines
May 14, 2015
Crowdstrike on Wednesday made public its discovery of yet another long-buried Linux vulnerability. "Venom," as it has been dubbed, was unearthed by the firm's senior security researcher, Jason Geffner. It is listed as vulnerability CVE-2015-3456. Venom exists in the virtual floppy drive code used by virtualization platforms based on QEMU, or quick emulator. It has been around since 2004.
Sage and Salesforce Tie Partnership Knot
May 13, 2015
Sage and Salesforce put on a lovefest on Tuesday to announce their partnership, in which Sage has developed Sage Life, a product to enable small companies to connect their customer, accounting, payroll and finance data into one system, accessible from any device, anywhere. It's unclear whether the customer data is held in Salesforce's traditional CRM or if it refers more broadly to ERP data.
Feds Value - but Don't Always Use - Big Data Tools for Cybersecurity
May 13, 2015
U.S. government agencies can significantly improve their ability to deal with cybersecurity problems by utilizing big data analytics. However, agencies are finding it difficult to fully benefit from these advanced analytical tools for a variety of reasons -- including dealing with the sheer volume of data. Cyberthreats hide in plain sight, suggests a recent report from MeriTalk.
The US Government vs. E-Commerce
May 12, 2015
"The chief business of the American people is business," President Calvin Coolidge said. Although that has become the country's rubric, lawmakers in the United States aren't inclined to give business free rein. The Justice Department last month trumpeted its first online marketing prosecution: the leveling of felony charges against David Topkins, a former executive of Art.com, for alleged price-fixing.
FAA's Next-Generation Air Transportation System Falters
May 11, 2015
The United States Federal Aviation Administration last week came under fire once again for problems with the implementation of its troubled Next Generation Air Transportation System. The NextGen program to overhaul the U.S. national air traffic control system, estimated to cost $29 billion between 2013 and 2030, long has been the target of congressional wrath.
The Cloud's Threatening Legal Storm
May 8, 2015
With the ever-increasing use of the cloud by more and more businesses, there is good reason to be concerned about legal risks, which are an inherent part of the cloud. The term "cloud" may be relatively new, but the concept of remote computing started more than 60 years ago, when Dartmouth University first launched "time-sharing." The remote computing risks have not abated.
Federal Appeals Court Rules NSA's Phone Data-Vacuuming Illegal
May 7, 2015
A U.S. Court of Appeals has ruled, in essence, that the NSA's collection of metadata concerning Americans' communications is illegal. The court vacated U.S. District Judge William Pauley's December 2013 ruling in ACLU v. Clapper, and remanded the case to the lower court. "The Second Circuit found the government incorrect in many of its arguments," said ACLU Staff Attorney Patrick Toomey.
EMC's ViPR Slithers Into Open Source
May 6, 2015
EMC on Wednesday announced it will release its commercial ViPR software storage controller technology as an open source project called "CoprHD." The ViPR software controller puts the control functionality and the data services into separate operational planes, allowing different data services to be layered onto a set of storage hardware products and cloud storage.
Everybody Loves Salesforce
May 6, 2015
Rumors about Salesforce.com being courted by Microsoft and Oracle have been swirling about Wall Street and Silicon Valley. However, it's not clear how much substance there is to the speculation. The buzz began with a report last Wednesday, and analysts ran with it. Oracle stirred the pot Thursday when co-CEO Safra Catz said a Salesforce.com acquisition would disrupt the software market.
Supreme Court to Hear 'Non-Injury' Privacy Class Action
May 6, 2015
The U.S. Supreme Court last month granted a request from Spokeo, a data aggregator, to consider whether the legal basis litigants must meet to file a claim in federal court should be broadly or narrowly defined. In the case, Spokeo, Inc. v. Thomas Robins, Thomas Robins is a resident of Virginia acting individually and as representative of a class.
Microsoft Fires Up Its Business Engines
May 5, 2015
Microsoft on Monday announced a slew of products and services for IT professionals at its first Ignite conference, being held in Chicago through Friday. Among them were the Microsoft Azure Stack, its next-generation hybrid cloud, and Windows Update for Business, a new management option for Windows 10 that will keep devices up to date with the latest security updates and Windows features.

See More Articles in Enterprise IT Section >>
Facebook Twitter LinkedIn Google+ RSS
Does technology create more jobs than it destroys?
Yes - The jobs new technologies create outnumber those lost due to machines replacing humans.
No- Companies fixated on cost-cutting are building workforces of robots and computers instead of people.