ANALYSIS: While the details regarding the sources and methods of the Oct. 21 DDoS attack that took down vast areas of the internet are still unclear, insecure endpoints are the likely culprit
News analysis
VMworld Europe 2016: VMware Offers Clouds, Clarity and Containers
VMWORLD 2016: VMware offered greater assurances to customers this year, showcasing its showcased its strategy for digital transformation, offering "any app, any device, any cloud"
What New Update Process For Windows 7 And 8.1 Means for Enterprises
ANALYSIS: Beginning this week, all updates will be roll-ups, with complete cumulative updates to begin in 2017, eliminating the ability to choose individual patches.
Why Has Universal Credit Been Such A Disaster For The Government?
Universal Credit: DWP battled with GDS, was overly ambitious with timelines and considered suing suppliers
The Battle To Restore Samsung’s Reputation Starts Now
ANALYSIS: Samsung had everything to gain with the Galaxy Note 7, but it has lost a golden opportunity and perhaps more
Using Big Data to Track Hurricane Evacuations
ANALYSIS: Cities and states in the areas of the Southeastern United States hit by Hurricane Matthew were proactive in ordering evacuations, but did it work?
IP Expo 2016: Microsoft CTO, Google And IBM Debate The Future Of Cloud
IP EXPO 2016: Microsoft Azure CTO Mark Russinovich and others discuss the future of cloud and whether security is still an issue
With Pixel Google Aims to Exert Greater Control Over Phone Support
ANALYSIS: Google's latest effort to produce an Android smartphone to compete with the Apple iPhone looks promising. But will it change the market landscape?
Federal Agencies Working With States to Guard Voter Data Security
Federal authorities saying they are investigating attempts to breach voter registration data and responding to state requests for assistance in securing election systems
Weak Device Security Turns IoT Into Powerful Weapon In DDoS Attacks
ANALYSIS: More than a million security cameras, video recorders and other devices were used in attacks on a U.S. security researcher and French network service provider
BlackBerry’s Smartphone Exit Will Mean Little To Most
ANALYSIS: BlackBerry's smartphone fall from grace is the end of an era but software-focused company has a chance despite previous mistakes
Social Media Analysis Shows Clinton Beat Trump In Presidential Debate
ANALYSIS: Analysis of sentiments expressed on social media showed how viewers' reactions tipped in favour of Hillary Clinton as debate progressed
iPhone 7 With Faster CPU, Improved Camera Works Fine for Business
REVIEW: Apple’s latest version of the iPhone will fit into your business just fine, but you should think about whether you truly need to upgrade to this new device
DDoS Attacks Heading Toward 1-Terabit Record
ANALYSIS: Although a 665Gbps attack is considered an outlier today, there will likely come a day when it is not looked at that way
What Should You Do After Massive Yahoo Hack?
ANALYSIS: Hackers have stolen details of 500m Yahoo accounts. Here's what you should do and what businesses should do next
Latest iOS 10 Security Features Help Apple’s Business Case
ANALYSIS: Integration with partners such as Cisco and centrally managed restrictions make iOS 10 a more secure enterprise platform, according to mobile-device management experts
Oracle Now Lays Claim As World’s One-Stop IT Shop
ANALYSIS: Oracle wants to become what IBM, the original Hewlett-Packard and Dell EMC once aspired to be: the true one-stop shop for all of your enterprise IT needs
Why Co-Founder Thinks Documentum Is Doomed Under OpenText
ANALYSIS: John Newton fears the new owner will promise customers investment in their products but that the product lines eventually will wither away
Dell, HPE CEOs Debate the Merits of Their Strategies
Michael Dell says scale is necessary in a fast-changing IT world, while Meg Whitman says being smaller and more nimble will win out
Three Returns To Underdog Role With Calls For Mobile Spectrum Limit
ANALYSIS: Now the proposed merger with O2 has been blocked, Three has no choice but to make noise and disrupt. This time, the battlefield is spectrum
What 23,000 Attendees Took Away From VMworld 2016
Perhaps the biggest news at the conference was that IBM Cloud became the first partner to use and help sell VMware's Cross-Cloud Architecture
Cold War Group to Probe Russian Hacks of U.S. Voter Databases
ANALYSIS: A little-known cold war group is assigned to investigate suspected hacks into Democratic National Committee and state voter registration databases
Why VMware, Pivotal Will Replace Quest as Dell Software
ANALYSIS: Dell and VMware aren't admitting it, but VMware and Pivotal are now, in effect, the new Dell Software
Why WD Is Moving from Hard Driver To DC Equipment Maker
ANALYSIS: The AI/machine learning era is the next arms race for companies looking to compete in the global market and exist in the next 25 years
At Six Years Old, OpenStack Questions Its Long-Term Viability
ANALYSIS: The future needs ideas like OpenStack, claims founder Jonathan Bryce
Vodafone Hasn’t Really Abolished Line Rental But It Has Made A Statement
ANALYSIS: Vodafone isn't really getting rid of line rental but by combining charges and offering cheap fibre, it shows it is committed to fixed broadband
Windows 10 Linux Feature Brings Real, But Manageable Security Risks
ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because of potential security risks
Windows 10 Anniversary Update Ends As A Tale Of Two Computers
REVIEW: Windows 10 Anniversary Update brings some much needed improvements, but successfully completing the installation can be an adventure
Samsung Positions Itself As Smartphones’ Great Innovator With Note 7
ANALYSIS: Samsung has gone for broke with the Galaxy Note 7 to show it can still innovate in the smartphone market
EE Outrage Shows Roaming Is No Longer An Optional Luxury
ANALYSIS: Few can travel without a smartphone in 2016, which is why EE roaming outage was such an issue for business travellers, tourists and even rockstars