OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
Private, Public Teamwork Needed to Fight ISIS on Twitter: Report
March 9, 2015
Social media firms should team up with the U.S. government to work out appropriate responses to extremism on their sites, recommends a Brookings Institution report. J.M. Berger and Jonathon Morgan last year launched a study to define and describe the population of ISIS supporters on Twitter. They found that ISIS ramped up efforts on Twitter following the suspension of many supporters' accounts.
Capitalizing on the Cloud
March 6, 2015
I've been traversing North America keynoting a series of cloud events hosted by Oracle. At every stop of the roadshow my comments regarding the opportunity to transform traditional product businesses into powerful information services via cloud-based alternatives has generated the greatest interest among enterprise decision-makers and software developers alike.
Nextdoor Snags $110M for Community-Building Efforts
March 5, 2015
Nextdoor on Wednesday announced it has received $110 million in venture capital to grow its neighborhood-based network of residents and vendors. Nextdoor plans to use the money to develop additional ways for members to benefit from the recommendations shared on the social network. "People don't know their neighbors -- but we are changing that," said spokesperson Jennifer Burke.
The Great War's Untapped Video Game Opportunities
March 5, 2015
It's fair to say that game developers have missed an opportunity with World War I. It was the first conflict to see aircraft used in combat, the first to see tanks and other armored vehicles make an appearance on the battlefield, and the first war in more than a century to completely draw in the major powers of the world. WWI should be a setting ripe for action and strategy games.
Nvidia's Shield Takes On Crysis With Confidence
March 4, 2015
Nvidia on Tuesday unveiled Shield, an Android TV console that in addition to playing content locally, can stream video games, movies, music, apps and more. Yes, it can play Crysis. That claim, a measure of a gaming PC's power a few years ago, is how Nvidia is marketing the Shield console. Nvidia's Shield Tablet led the way with its Tegra K1 processor and its ability to play Android ports of AAA games natively.
Twitter's New Safety Rules: Hot Diggity or Hot Air?
March 3, 2015
Twitter has announced actions to further protect users of its network -- but it left them vague. The company is rolling out unspecified improvements to its reporting process for content issues including impersonation, self-harm, and the sharing of private and confidential information, aka "doxing." It's also beginning to add new enforcement actions for use against accounts that violate its rules.
CPQ's Time to Shine
March 2, 2015
Last month, Salesforce Ventures, Salesforce's corporate investment group, swung into action. They led a Series B round of funding that garnered US$41 million for Apttus, a high-flying CPQ vendor. Salesforce Ventures also participated in SteelBrick raising a series B round of $18 million. That's two CPQ vendors that Salesforce has taken an interest in. The question is, why?
FCC Comes Through on Net Neutrality
February 27, 2015
The FCC has adopted new open Internet rules by a 3-2 vote along party lines. The rules, which affect both wired and wireless access, prohibit broadband providers from unreasonably interfering with efforts of consumers and edge providers to reach each other. The Internet is "simply too important to be left without rules and without a referee on the field," said FCC Chairman Tom Wheeler.
Net Neutrality: All Over but the Shouting?
February 25, 2015
After well over a year of bitter, often highly partisan debates, and despite dissension within its ranks and opposition from industry groups, the United States Federal Communications Commission is expected on Thursday to vote in favor of rules enforcing Net neutrality. The commission wants to regulate ISPs like common carriers under Title II of the Communications Act of 1934.
Open Source vs. Proprietary Firms on the IoT Battleground
February 25, 2015
A battle is brewing over control of the Internet of Things marketplace. Consumers see only convenience and extensions to their always-on mobile devices. Product makers see a pathway to streaming data that can be monetized from buyers' connections. Will history repeat itself, as open source begins to take on the current, yet unsustainable, walled-garden core of the IoT?
Google Puts Blogger Porn Under Wraps
February 25, 2015
Google will place a privacy curtain around sexually explicit images and video on its Blogger platform if users fail to remove the content of their own volition by March 23. The measure falls short of outright censoring the content or terminating users. However, it does restrict access to the owner or admins of the blog and the people with whom the owner has shared it.
Making Sense of the Muddled In-Home Entertainment Market
February 20, 2015
The global access and entertainment services marketplace continues its pace of dramatic change, as broadband services achieve new levels of penetration and speed worldwide. Emerging markets are experiencing rapid growth, as many homes obtain high-speed broadband services for the first time. Pay TV is seeing a similar pattern in global growth.
Are Call Centers Ready for the Internet of Things?
February 17, 2015
The IoT represents a wealth of untapped riches -- and there's no shortage of data highlighting the potential this technology has for the economy. The demand is there, as is the supply. However, there's one piece that may or may not be missing, depending on whom you ask: the back end capacity to handle the information these devices will generate.
Encryption Can Create Stormy Weather in the Cloud
February 17, 2015
Encryption has received a lot of attention lately as a solution to the growing data breach problem, but one of the hang-ups dogging the technology has been its ability to play nice in the cloud. That's especially true if an organization wants to control the keys by which its data is scrambled and use services offered by a cloud provider beyond simple storage.
Is Paltrow More Qualified Than Mayer to Run Yahoo?
February 16, 2015
While working on a piece about bad decisions recently, I revisited Yahoo CEO Marissa Mayer's decision not to hire Academy Award winner and successful lifestyle author and blogger Gwyneth Paltrow for a lifestyle editing position...because she didn't have a college degree. Let's explore the idea of Paltrow running Yahoo -- and we'll also take a look at my product of the week: an amazing new curved phone from LG.
'Digital Dark Age' Imminent Warns 'Father of the Internet'
February 13, 2015
"Old formats that contain documents, photos and other data may not be readable with the latest version of the software," warned Vint Cerf, vice president and chief Internet evangelist for Google. Cerf added that backwards compatibility is not guaranteed, and over time there could be vast archives of digital content that becomes lost because it simply can't be accessed.
Facebook Launches ThreatExchange to Stymie Cybercrime
February 13, 2015
"Threat researchers do already share this data manually," Jeremy Demar, director of threat research at Damballa, told TechNewsWorld. "The value in systems like this isn't the ability to share raw intelligence [it's the] structured data that allows for the information to be accessed quickly and easily by the users." ThreatExchange is based on Facebook's ThreatData threat analysis framework.
Facebook Lets Members Prepare for the Digital Beyond
February 13, 2015
Facebook on Thursday announced a new feature for members who want to plan for their passing into the digital beyond. The feature allows Facebook members to appoint a "legacy contact" to administer their account when they die. Legacy contacts will, among other powers, have the authority to download an archive of the deceased member's public information, including photos, posts and profile information.
BitTorrent's Original Content Deal Makes Bid for Reputability
February 11, 2015
BitTorrent will begin to offer a series of original movies, dubbed "BitTorrent Originals," in a bid to enter the content entertainment space later this year. BitTorrent inked a deal with Rapid Eye Studios to handle original video content for its BitTorrent Bundle platform, which launched in May 2013. More than 10,000 publishers have joined the platform, according to company officials.
Box to Let Enterprises Bring Their Own Keys to the Cloud
February 11, 2015
Box on Tuesday raised the curtain on a new offering that allows its enterprise customers to control the digital keys used to encrypt their data stored in the storage provider's cloud. Box is working with Amazon Web Services and Gemalto to bring to market "Box Enterprise Key Management," and give its most security-minded customers total control over the keys used to encrypt data they store on Box.
Bug Bounties Entice Researchers to Don White Hats
February 10, 2015
Bug bounty programs are used by individual software makers to improve the quality of their products, but they can have incidental benefits for all software makers, too. One of those is to encourage bug hunters to wear a white hat instead of a black one. When you make it easy for hackers to do the right thing, the majority will," noted Alex Rice, CTO of HackerOne.
Federal 'Internet of Things' Report Triggers Debate, Senate Inquiry
February 10, 2015
Just how close is 'too close for comfort' in the unprecedented connectivity of people, products and electronic communication that lies ahead with the Internet of Things? Should the providers of electronic devices be allowed to know when you set your house thermometer, or how often and how long you go for a jog using a 'wearable' electronic exercise sensor?
Report: Connected Vehicles Vulnerable to Hack Attacks
February 9, 2015
Motorists in the United States are increasingly at risk of cyberattacks and violations of privacy, as more and more technology is added to their cars. A report released on Sunday by the office of Sen. Ed Markey (D-Mass.) listed a number of key findings that are based on responses from 16 auto makers to a letter sent to them by Markey's office.
Concerns Emerge About Samsung Smart TVs 'Bugging' Owners
February 9, 2015
The feature in question may transmit some voice commands, along with information about the device, to a third-party service that converts speech to text, Samsung's global privacy policy warns. If voice recognition is going to be on all the time, "that seems like really poor design, and certainly represents a privacy risk," said Justin Brookman, director of the consumer privacy project at the Center for Democracy & Technology.

See More Articles in Internet Section >>
Facebook Twitter LinkedIn Google+ RSS
Are tablets over?
No - Mine is a prized possession.
No - Heavy laptops are over.
No - I don't have one yet, but I want one.
Maybe - They're good for kids, though.
Yes - Large smartphones make them redundant.
Yes - I won't replace mine.
Yes - Don't have one, don't want one.