OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
FCC Drops Net Neutrality Rules on Dissection Table
March 12, 2015
The U.S. Federal Communications Commission has released the final version of its controversial open Internet rules. In the introduction to the some 400 pages of new rules, which cover both wired and wireless broadband, the commission stated its "carefully tailored rules" would prevent specific practices that are harmful to Internet openness, such as blocking, throttling and paid prioritization.
The CIA Has Been Hacking iOS for Years: Report
March 12, 2015
The CIA for years has been working to break iOS security, according to a report published Tuesday. The allegations are based on documents provided by NSA whistle-blower Edward Snowden. Researchers working with the CIA have presented their tactics and achievements at Trusted Computing Base Jamborees, secret annual gatherings that have been going on for nearly a decade.
Google Casts Nearline to Lure Cloud Customers
March 11, 2015
Google on Wednesday launched Nearline Storage, the latest addition to the Google Cloud Platform. Nearline seeks to reel in enterprises to the wider Google Cloud Platform with the promise of low-cost, low-latency storage for limitless amounts of data. Nearline has all of the benefits of offline, or "cold," storage, but the data it houses is available in a matter of seconds instead of hours.
Security Experts Rap Clinton's Email Practices
March 11, 2015
Former Secretary of State Hillary Clinton is in hot water over her use of a private email server to handle emails for official business. The practice was very risky cybersecurity behavior for everyone involved, critics have alleged. In taking her mail outside the State Department's systems, Clinton appears to have turned up her nose at the agency's rules.
Record Systems as Deal Savers
March 11, 2015
Transaction systems have all the fun but systems of record do all of the work; at least it seems that way. Maybe you've never thought of it this way but unless both kinds of systems are working well -- and working together -- your results will suffer. Record systems can tell you what happened, but by themselves they don't bring in business.
Proposed 2016 Federal Budget Plumps IT Spending by $2B
March 11, 2015
The U.S. government will increase IT spending for the third year in a row, if the Obama administration's proposed 2016 fiscal year budget passes. The 2016 budget request includes civilian agency IT spending at $49.1 billion and defense IT expenditures at $37.3 billion. The 2016 total of $86.4 billion is about $2 billion more than for 2015, and it is more than double the amount spent in 2001.
Schumer to FAA: Straighten Up Cybersecurity and Fly Right
March 10, 2015
The United States Federal Aviation Administration should implement cybersecurity upgrades recommended by the U.S. Government Accountability Office immediately, or risk hackers taking over its computer systems, Sen. Charles Schumer, D-N.Y., has warned. The GAO last week released a report that found significant security control weaknesses in the FAA's computer systems.
Private, Public Teamwork Needed to Fight ISIS on Twitter: Report
March 9, 2015
Social media firms should team up with the U.S. government to work out appropriate responses to extremism on their sites, recommends a Brookings Institution report. J.M. Berger and Jonathon Morgan last year launched a study to define and describe the population of ISIS supporters on Twitter. They found that ISIS ramped up efforts on Twitter following the suspension of many supporters' accounts.
RHEL 7 Atomic Host Bolsters Container Security
March 9, 2015
Red Hat last week made Red Hat Enterprise Linux 7 Atomic Host generally available, following a four-month live beta test. "The beta release was very successful," said Lars Herrmann, senior director of product strategy at Red Hat. Feedback from customers and partners "helped us refine several features and tools" for the GA version. Atomic Host is a lean OS designed to run Docker containers.
Hillary Clinton's Possibly Fatal Email Mistake
March 9, 2015
Hillary Clinton's email scandal showcases that she shouldn't be president. This has nothing to do with her party or politics -- it has to do with how she seems to approach a decision -- through tunnel vision leadership. This method isn't biased on the left or right, but it is more hardwired into men than women. Unfortunately, Clinton seems to have this in spades.
Capitalizing on the Cloud
March 6, 2015
I've been traversing North America keynoting a series of cloud events hosted by Oracle. At every stop of the roadshow my comments regarding the opportunity to transform traditional product businesses into powerful information services via cloud-based alternatives has generated the greatest interest among enterprise decision-makers and software developers alike.
We Done Good, Consumer Protection Chief Tells Lawmakers
March 5, 2015
The U.S. Consumer Financial Protection Bureau has made great strides in carrying out its mission, which is to ensure consumers are fairly treated in the financial marketplace, Director Richard Cordray said Tuesday at a House Financial Services hearing. The bureau's qualified mortgage rule put new measures in place to prevent the sloppy underwriting that led to the subprime mortgage problem.
China's Cybersecurity Plans Draw US Fire
March 5, 2015
China should change its tune on new rules for purchases from American high-tech companies if it wants to do business with the United States, President Obama recently warned. China reportedly is planning to ask U.S. high-tech firms to hand over their encryption keys and install security backdoors in their systems to allow surveillance as a counterterrorism measure.
Just Showing Up Won't Capture Federal Cloud Business
March 3, 2015
The observation that "80 percent of life is just showing up," generally attributed to comedian Woody Allen, has morphed into the admonition that "80 percent of success is just showing up." However, it appears that vendors who just show up with a generalized approach to marketing cloud technology to federal government agencies likely won't attract much business.
The Open Source Squad at the GSA
March 3, 2015
18F, a development unit within the General Services Administration, was established a year ago to tap into the success of the United Kingdom's Government Digital Services unit by pursuing a similar strategy. The unit is tasked with getting developers from Silicon Valley and the ranks of civic developers all over the country to change how federal technology gets done.
Monster Problem Threatens New US Cyberthreat Plan
March 3, 2015
President Barack Obama last week made good on his promise to establish a center for cybersecurity information gathered by agencies of the federal government. It's a laudable initiative -- if it works. The Cyber Threat Intelligence Integration Center will connect the dots regarding malicious foreign cyberthreats to the nation and cyberincidents affecting U.S. national interests.
CPQ's Time to Shine
March 2, 2015
Last month, Salesforce Ventures, Salesforce's corporate investment group, swung into action. They led a Series B round of funding that garnered US$41 million for Apttus, a high-flying CPQ vendor. Salesforce Ventures also participated in SteelBrick raising a series B round of $18 million. That's two CPQ vendors that Salesforce has taken an interest in. The question is, why?
FCC Comes Through on Net Neutrality
February 27, 2015
The FCC has adopted new open Internet rules by a 3-2 vote along party lines. The rules, which affect both wired and wireless access, prohibit broadband providers from unreasonably interfering with efforts of consumers and edge providers to reach each other. The Internet is "simply too important to be left without rules and without a referee on the field," said FCC Chairman Tom Wheeler.
Government Spies Came Up Dry, Says Gemalto
February 26, 2015
SIM card maker Gemalto, whose networks reportedly were breached by hackers from the United States National Security Agency and the UK's GCHQ, on Wednesday said the spies got nothing. The hackers stole cryptokeys for millions of SIM cards, according to The Intercept, which cited documents released by NSA whistle-blower Edward Snowden. Gemalto denied any SIM cryptokeys had been stolen.
Net Neutrality: All Over but the Shouting?
February 25, 2015
After well over a year of bitter, often highly partisan debates, and despite dissension within its ranks and opposition from industry groups, the United States Federal Communications Commission is expected on Thursday to vote in favor of rules enforcing Net neutrality. The commission wants to regulate ISPs like common carriers under Title II of the Communications Act of 1934.
Yahoo CISO, NSA Chief Slug It Out Over Security Backdoors
February 25, 2015
Yahoo CISO Alex Stamos on Monday confronted NSA Director Adm. Mike Rogers over the United States government's plan to require built-in backdoors in hardware and software made by American companies. The exchange took place at the New America Foundation's cybersecurity conference. Building backdoors into cryptography is "like drilling a hole in the windshield," Stamos said.
FTC, Private Sector Lock Horns Over Consumer Data Protection
February 25, 2015
The major headline hacking event of 2014 involved data theft at a highly visible enterprise: Sony Pictures. Perhaps just as significant in e-commerce security was a 2014 federal court ruling which allows the FTC to continue penalizing commercial firms for failure to protect consumer data from hackers. That decision has been challenged, and in early March the FTC and its opponent will square off in court.
Relax, You're Surrounded
February 25, 2015
I don't know how many old movies there are in which the good guys say, "You're surrounded, come out with your hands up!" Somehow being surrounded is a bad thing -- or at least it was -- until it became a hot trend in the back office. Let me explain. Surrounding legacy systems, such as conventional ERP, is proving to be a good idea for a bunch of reasons.
Citizenfour's Oscar Highlights National Divide Over Snowden
February 24, 2015
Citizenfour, a film documenting interviews director Laura Poitras conducted with whistle-blower Edward Snowden, won the Oscar for best documentary Sunday. The talks took place as Snowden blew the lid off the United States National Security Agency's surveillance activities. The award highlights the divisions in the U.S. over Snowden's actions and the question of national security.

See More Articles in Enterprise IT Section >>
Facebook Twitter LinkedIn Google+ RSS
Is native advertising good for journalism?
Yes -- It's a reasonable source of additional revenue for media outlets to support their traditional editorial efforts.
Yes -- Paid-for articles can contain useful information, but readers might bypass them if they look too much like ads.
Maybe -- But only if it's clearly labeled as paid-for content.
No -- I don't trust any information from media outlets that cloak paid-for content as objective journalism.
No -- Native advertising is confusing and devious, and it threatens the fabric of traditional journalism.
I Don't Know -- I don't understand what native advertising is.
PENN STATE ONLINE Information Technology Degrees and Certificates