New release of Red Hat's hybrid cloud management platform provides improved container, Microsoft Azure, Google Cloud Platform and OpenStack capabilities
ANALYSIS: VR, AR, AI assistants and IoT security will be talk of the show as consumer tech provides innovation for…
ANALYSIS: Constant bad news about Russian hacking and the increasing prevalence of ransomware made 2016 an IT security disaster... but…
NEWS ANALYSIS: ClusterHQ which had been an early pioneer in the container storage market with its open-source Flocker project, ceases…
IOactive finds security flaws in Panasonic's Avionic In-Flight Entertainment (IFE) system that could potentially give an attacker unauthorised access
Five years after Watson made its international splash by unseating the "Jeopardy" television quiz show's human champion Ken Jennings, it's…
New release of open-source Kubernetes container orchestration system adds initial support for Microsoft Windows Server and previews beta stateful application…
ANALYSIS: Pebble is being acquired by fitness tracker vendor Fitbit, but that doesn't mean the wearable market is dead
Docker to directly integrate storage capabilities into its container engine, while still leaving room for organizations to choose other storage…
40 organisations are now part of the effort to train Watson for Cyber Security in an effort to improve security…
ANALYSIS: With the possibility that fake news may have impacted the US election, people are giving a new look to…
ANALYSIS: The rules of traditional warfare don't apply in cyber war, even to the point where it's hard to tell…
After Oracle completed its acquisition ofNetSuite, executives from both companies detailed what’s in store for customers
Researchers from Google publish a paper describing a new deep learning algorithm for detecting signs of diabetic retinopathy.
ANALYSIS: Despite the suspicions a group of computer scientists, a recount of close presidential election tallies in three states won't…
ANALYSIS: Encryption keys are wonderful things that allow your organisation to conduct secure communications without issue- as long as you…
Traditional data sampling and analysis methods that worked well for decades suddenly failed during the Presidential election of 2016
ANALYSIS: Never before have social media and even cyber-spying been used to such an enormous extent to shape voter sentiment
ANALYSIS: For years a major threat to enterprises has been a gap between IT departments and the security teams competing…
Network isolation isn't the only way to secure application containers anymore, so Aporeto unveils a new security model for containers…
IN DEPTH: Node.js, the JavaScript runtime of choice for high-performance, low latency apps, continues to gain popularity among developers on…
ANALYSIS: With Surface sales rising, Microsoft is challenging Apple in enterprise creative domains where the Mac long held sway
At the first OpenPower Summit on the continent, the group unveiled new projects and offerings based on the open architecture
Walmart wasn't always an open-source advocate, but now it's one of the biggest consumers of open-source and is actively building…
ANALYSIS: While the details regarding the sources and methods of the Oct. 21 DDoS attack that took down vast areas…
In a SecTor keynote, F-Secure's Mikko Hypponen explains why ransomware is so bad and what the Russians really have in…
Oracle's latest Critical Patch Update, which fixes 253 vulnerabilities, is the company's second-largest CPU ever.
A new hospital being built at UC-San Diego has iPads and Apple TV in each of its 245 rooms to…
Google and Rackspace announced draft specifications for the Zaius P9 data center server. The design implements Open Compute Project server…
Microsoft is offering Azure Government Cloud customers documentation on deploying services that meet stringent federal security requirements