eWeek

Trump’s Cyber Security Executive Order Is A Good First Step

Executive Order includes efforts to modernise IT systems and protect critical infrastructure

8 years ago

Watson to Enable In-Game Voice Interaction In Star Trek VR Game

Players in the new "Star Trek: Bridge Crew" virtual reality game will benefit from in-game voice interaction powered by IBM…

8 years ago

Microsoft Widens Office’s Doors for Developers At Build

Microsoft announces new ways developers can integrate their apps with Teams, Word, Excel and more at Build

8 years ago

How VMware Is Helping Google Make Chromebooks More Relevant For Business

DELL EMC WORLD 2017: It does make a modicum of sense that the world’s virtualisation king would get involved with…

8 years ago

Snowden Advocates the Need for Open Source And OpenStack

NSA whistleblower Edward Snowden says that open source and OpenStack can help users avoid the silent vulnerability of things they…

8 years ago

OpenStack Summit Emphasizes Emerging Deployment Models

The OpenStack Summit kicks off with discussion on moving beyond just the private cloud model to a managed private-cloud-as-a-service approach

8 years ago

Oracle CEO Mark Hurd Says Enterprise Cloud Migration In Early Stages

Oracle executives discuss the company’s enterprise cloud strategy and announced a big deal with AT&T affecting 70,000 service personnel

8 years ago

Microsoft Invests In Two More Artificial Intelligence Startups

It's never been a better time to be an AI startup looking for funding

8 years ago

Google Criticized For Requesting More Groundwater To Cool Data Center

Google says own studies show that pumping 1.5m gallons a day from an aquifer to cool its data center will…

8 years ago

Hackers Steal, Release New Netflix ‘Orange Is the New Black’ Episodes

ANALYSIS: Attackers leak new season of the Netflix show "Orange Is the New Black," exposing a weakness in the distributed…

8 years ago

FCC Chairman Sets Public Course for Making New Internet Regulations

ANALYSIS: FCC Chairman Ajit Pai says starting a fully public rule-making process to reverse last year's decision to regulate ISPs

8 years ago

How F8 Illustrated Facebook’s Continuous Evolution

ANALYSIS: Facebook uses F8 conference to show that it continues to move far beyond just being the "Blue App" on…

8 years ago

Philips Executive Wants Enterprises to Move Down Digital Path

ANALYSIS: Liat Ben Zur is showing enterprises how to move from just making and marketing products into becoming fully-realized digital…

8 years ago

Docker Expands Enterprise Focus As Container Ecosystem Matures

Docker discusses initiatives at DockerCon that that will help enterprises implement containers as the open source technology evolves and matures

8 years ago

Docker Opens Ups Container Platform With LinuxKit And Moby Project

At DockerCon 17, Docker announces a pair of new projects to help developers and organisations build their own container-optimized Linux…

8 years ago

Intel Developer Forum Falls Victim To Chip Maker’s Evolution

The chip maker's increasingly diverse market focus leads Intel to retire the popular annual developer conference.

8 years ago

Latest Tax Scams Pressure Businesses With Emails, Phone Calls

ANALYSIS: While most tax scams target individual taxpayers, there are some new ones aimed at businesses that will try to…

8 years ago

Why Hope Springs Eternal For Apple To Introduce An iPad Pro In 2017

ANALYSIS: There are still plenty of reasons to believe that Apple will follow up new iPad by introducing an updated…

8 years ago

IBM Report Details 2017 Tax Scams As IRS Filing Deadline Nears

As the Tax Day 2017 filing deadline of Tuesday April 18 nears, IBM is warning of an increase in tax-related…

8 years ago

Moonlight Maze Attack Still Relevant Two Decades After Initial Debut

Attack code first used in 1996 is still in use by attackers building malware in 2017, according to new research…

8 years ago

Macro Malware, Aging Worms Continue To Pose Threat To Present Day

Macro malware, which is so 1990s, has made a comeback, joining other aging cyber-threats, such as PHP scripts and the…

8 years ago

Quiet Release Of New iPad Signals Change In Apple Marketing Approach

The only mention of the new version of the iPad and the updated version of iOS were press releases, with…

8 years ago

IBM Tells Customers That ‘Cloud Native’ Is The Future

ANALYSIS: IBM tells customers at InterConnect that "Cloud Native" applications that are designed and optimized to run in the cloud…

8 years ago

Software AG Brings Structure, Security To The Internet Of Things

Combining an open model with enforced standards solves many of the challenges presented by the internet of things

8 years ago

How IBM Plans To Serve The ‘Making Better Decisions’ Business Market

ANALYSIS: IBM's multibillion-dollar strategy for a market no-one else has ever heard of...

8 years ago

Docker At 4: The Container Revolution Continues

ANALYSIS: Four years ago, few had heard of Docker. Now it's one of the leading technologies helping to enable DevOps…

8 years ago

Pwn2Own Hackers Earn $340,000 Exploiting Windows, macOS

The second day of the Pwn2Own 2017 hacking competition reveals Windows, macOS, Adobe Flash and web browser exploits

8 years ago

Ubuntu Linux Falls On Day 1 Of Pwn2Own Hacking Competition

First day of Trend Micro-sponsored Pwn2Own competition awards $233,000 to security researchers for exploiting software

8 years ago

Unsecured Apple, Android Smartphones Are Major Security Threats

ANALYSIS: Apple & Android smartphones that lack augmented security measures leave high-priority hacking targets, such as President Donald Trump, vulnerable

8 years ago

WD, UN Use Big Data Competition To Fight Climate Change

Data for Climate Action is an open innovation challenge to use data science and big data from the private sector…

8 years ago