Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS · Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
What Mobile World Congress Delivered Besides Same-Old Smartphones
March 10, 2015
The latest handsets and tablets received their share of headlines at this year's MWC, but their mindshare shrank considerably. Sony unveiled its Xperia Z4 tablet, possibly its last hurrah in the mobile space. Meanwhile, Samsung's Galaxy S6 smartphone stole the spotlight. However, with more than 2,000 tech organizations promoting their wares and services, MWC 2015 offered a fresh set of promises.
Ellen Pao Airs Kleiner Perkins' Dirty Laundry
March 10, 2015
Ellen Pao on Monday testified in a San Franciso courtroom that she was passed up for promotions and sexually harassed by a partner during her employment at prestigious venture capital firm Kleiner Perkins Caufield and Byers. Pao said that after she broke off a relationship with former Kleiner Perkins partner Ajit Nazre, he made it difficult for her to do her job.
Apple Springs Bevy of New Products at Watch Event
March 09, 2015
The Apple Watch wasn't the only new product to take the stage at Apple's Monday media event -- Apple also introduced an all-new sleek MacBook. In addition, Apple nabbed the chance to be the exclusive launch partner for HBO's new streaming subscription service. Among the event highlights: Apple Watch will be available for preorder April 10, sale April 24; and Apple Watch Edition starts at $10,000.
Private, Public Teamwork Needed to Fight ISIS on Twitter: Report
March 09, 2015
Social media firms should team up with the U.S. government to work out appropriate responses to extremism on their sites, recommends a Brookings Institution report. J.M. Berger and Jonathon Morgan last year launched a study to define and describe the population of ISIS supporters on Twitter. They found that ISIS ramped up efforts on Twitter following the suspension of many supporters' accounts.
Capitalizing on the Cloud
March 06, 2015
I've been traversing North America keynoting a series of cloud events hosted by Oracle. At every stop of the roadshow my comments regarding the opportunity to transform traditional product businesses into powerful information services via cloud-based alternatives has generated the greatest interest among enterprise decision-makers and software developers alike.
Nextdoor Snags $110M for Community-Building Efforts
March 05, 2015
Nextdoor on Wednesday announced it has received $110 million in venture capital to grow its neighborhood-based network of residents and vendors. Nextdoor plans to use the money to develop additional ways for members to benefit from the recommendations shared on the social network. "People don't know their neighbors -- but we are changing that," said spokesperson Jennifer Burke.
The Great War's Untapped Video Game Opportunities
March 05, 2015
It's fair to say that game developers have missed an opportunity with World War I. It was the first conflict to see aircraft used in combat, the first to see tanks and other armored vehicles make an appearance on the battlefield, and the first war in more than a century to completely draw in the major powers of the world. WWI should be a setting ripe for action and strategy games.
Nvidia's Shield Takes On Crysis With Confidence
March 04, 2015
Nvidia on Tuesday unveiled Shield, an Android TV console that in addition to playing content locally, can stream video games, movies, music, apps and more. Yes, it can play Crysis. That claim, a measure of a gaming PC's power a few years ago, is how Nvidia is marketing the Shield console. Nvidia's Shield Tablet led the way with its Tegra K1 processor and its ability to play Android ports of AAA games natively.
Twitter's New Safety Rules: Hot Diggity or Hot Air?
March 03, 2015
Twitter has announced actions to further protect users of its network -- but it left them vague. The company is rolling out unspecified improvements to its reporting process for content issues including impersonation, self-harm, and the sharing of private and confidential information, aka "doxing." It's also beginning to add new enforcement actions for use against accounts that violate its rules.
CPQ's Time to Shine
March 02, 2015
Last month, Salesforce Ventures, Salesforce's corporate investment group, swung into action. They led a Series B round of funding that garnered US$41 million for Apttus, a high-flying CPQ vendor. Salesforce Ventures also participated in SteelBrick raising a series B round of $18 million. That's two CPQ vendors that Salesforce has taken an interest in. The question is, why?
FCC Comes Through on Net Neutrality
February 27, 2015
The FCC has adopted new open Internet rules by a 3-2 vote along party lines. The rules, which affect both wired and wireless access, prohibit broadband providers from unreasonably interfering with efforts of consumers and edge providers to reach each other. The Internet is "simply too important to be left without rules and without a referee on the field," said FCC Chairman Tom Wheeler.
Net Neutrality: All Over but the Shouting?
February 25, 2015
After well over a year of bitter, often highly partisan debates, and despite dissension within its ranks and opposition from industry groups, the United States Federal Communications Commission is expected on Thursday to vote in favor of rules enforcing Net neutrality. The commission wants to regulate ISPs like common carriers under Title II of the Communications Act of 1934.
Open Source vs. Proprietary Firms on the IoT Battleground
February 25, 2015
A battle is brewing over control of the Internet of Things marketplace. Consumers see only convenience and extensions to their always-on mobile devices. Product makers see a pathway to streaming data that can be monetized from buyers' connections. Will history repeat itself, as open source begins to take on the current, yet unsustainable, walled-garden core of the IoT?
Google Puts Blogger Porn Under Wraps
February 25, 2015
Google will place a privacy curtain around sexually explicit images and video on its Blogger platform if users fail to remove the content of their own volition by March 23. The measure falls short of outright censoring the content or terminating users. However, it does restrict access to the owner or admins of the blog and the people with whom the owner has shared it.
Making Sense of the Muddled In-Home Entertainment Market
February 20, 2015
The global access and entertainment services marketplace continues its pace of dramatic change, as broadband services achieve new levels of penetration and speed worldwide. Emerging markets are experiencing rapid growth, as many homes obtain high-speed broadband services for the first time. Pay TV is seeing a similar pattern in global growth.
Are Call Centers Ready for the Internet of Things?
February 17, 2015
The IoT represents a wealth of untapped riches -- and there's no shortage of data highlighting the potential this technology has for the economy. The demand is there, as is the supply. However, there's one piece that may or may not be missing, depending on whom you ask: the back end capacity to handle the information these devices will generate.
Encryption Can Create Stormy Weather in the Cloud
February 17, 2015
Encryption has received a lot of attention lately as a solution to the growing data breach problem, but one of the hang-ups dogging the technology has been its ability to play nice in the cloud. That's especially true if an organization wants to control the keys by which its data is scrambled and use services offered by a cloud provider beyond simple storage.
Is Paltrow More Qualified Than Mayer to Run Yahoo?
February 16, 2015
While working on a piece about bad decisions recently, I revisited Yahoo CEO Marissa Mayer's decision not to hire Academy Award winner and successful lifestyle author and blogger Gwyneth Paltrow for a lifestyle editing position...because she didn't have a college degree. Let's explore the idea of Paltrow running Yahoo -- and we'll also take a look at my product of the week: an amazing new curved phone from LG.
'Digital Dark Age' Imminent Warns 'Father of the Internet'
February 13, 2015
"Old formats that contain documents, photos and other data may not be readable with the latest version of the software," warned Vint Cerf, vice president and chief Internet evangelist for Google. Cerf added that backwards compatibility is not guaranteed, and over time there could be vast archives of digital content that becomes lost because it simply can't be accessed.
Facebook Launches ThreatExchange to Stymie Cybercrime
February 13, 2015
"Threat researchers do already share this data manually," Jeremy Demar, director of threat research at Damballa, told TechNewsWorld. "The value in systems like this isn't the ability to share raw intelligence [it's the] structured data that allows for the information to be accessed quickly and easily by the users." ThreatExchange is based on Facebook's ThreatData threat analysis framework.
Facebook Lets Members Prepare for the Digital Beyond
February 13, 2015
Facebook on Thursday announced a new feature for members who want to plan for their passing into the digital beyond. The feature allows Facebook members to appoint a "legacy contact" to administer their account when they die. Legacy contacts will, among other powers, have the authority to download an archive of the deceased member's public information, including photos, posts and profile information.
BitTorrent's Original Content Deal Makes Bid for Reputability
February 11, 2015
BitTorrent will begin to offer a series of original movies, dubbed "BitTorrent Originals," in a bid to enter the content entertainment space later this year. BitTorrent inked a deal with Rapid Eye Studios to handle original video content for its BitTorrent Bundle platform, which launched in May 2013. More than 10,000 publishers have joined the platform, according to company officials.
Box to Let Enterprises Bring Their Own Keys to the Cloud
February 11, 2015
Box on Tuesday raised the curtain on a new offering that allows its enterprise customers to control the digital keys used to encrypt their data stored in the storage provider's cloud. Box is working with Amazon Web Services and Gemalto to bring to market "Box Enterprise Key Management," and give its most security-minded customers total control over the keys used to encrypt data they store on Box.
Bug Bounties Entice Researchers to Don White Hats
February 10, 2015
Bug bounty programs are used by individual software makers to improve the quality of their products, but they can have incidental benefits for all software makers, too. One of those is to encourage bug hunters to wear a white hat instead of a black one. When you make it easy for hackers to do the right thing, the majority will," noted Alex Rice, CTO of HackerOne.

See More Articles in Internet Section >>
Facebook Twitter LinkedIn Google+ RSS
Are you looking forward to self-driving cars?
You bet -- I'd love to have a built-in chauffeur.
Yes -- self-driving cars will save lives.
Kind of -- I'd like some self-driving features, like parking.
No -- self-driving cars are too dangerous.
No -- I don't want to give up another freedom.
Absolutely not -- I saw Terminator and I'm not letting some robot take me for a ride!
Salsify 30-day free trial
dynatrace