The next big culture shift in consumer technology is clearly home automation. Over the next two or three years, a dizzying array of home appliances and devices will connect up with your phone and TV box to make everything "smart" (which, let's face it, is a euphemism for "more fun but also more expensive and complex").
By Mike Elgan | 25 May, 2015 20:19
Some things are just so predictable. A retailer is told about a mobile security hole and dismisses it, saying it could never happen in real life -- and then it happens. A manufacturer of passenger jets ridicules the risk posed by a wireless security hole in its aircraft, saying defensive mechanisms wouldn't let it happen -- and then it happens.
By Evan Schuman | 19 May, 2015 19:09
When Linux first became a serious challenger for enterprise-class infrastructure, traditional IT vendors had to contend and to rationalize just what exactly this open source thing was. The initial response from many vendors was to attempt to stop it, but it only grew.
By Art Fewell | 19 May, 2015 06:39
You can do almost everything online. Most people spend most of their web time doing just three things: communicating, buying things and consuming content.
By Mike Elgan | 18 May, 2015 20:43
What do Facebook, Apple, Google, Amazon and Netflix have in common? In addition to being U.S. tech giants, they're in the crosshairs of European regulators and may face big fines and stiff rules reining in the way they operate on the continent.
By Preston Gralla | 14 May, 2015 04:12
In the Internet era, many multibillion-dollar acquisitions sound insanely ambitious and out of line.
By Matt Hamblen | 13 May, 2015 04:46
Interest and press around artificial intelligence (AI) comes and goes, but the reality is that we have had AI systems with us for quite some time. Because many of these systems are narrowly focused (and actually work), often times they are not thought of as being AI.
By Kris Hammond | 11 May, 2015 22:56
Microsoft is set to upend a 12-year practice of providing security patches on the same day each month to everyone. Or not.
By Gregg Keizer | 08 May, 2015 07:00
Every now and then, a product comes along that is either genius-level brilliant or celestially clueless. To get the CC award, product designers must force themselves to not only ignore the bad ways the product could be used or to naively believe that minimal safeguards would prevent them. For your consideration: the GeniCan, which scans and otherwise figures out almost everything you are throwing away or recycling and wirelessly transmits that data back to the mother ship.
By Evan Schuman | 05 May, 2015 19:09
AMD CEO Lisa Su let the cat out of the bag: Microsoft will be releasing Windows 10 in late July.
By Steven J. Vaughan-Nichols | 30 April, 2015 03:27
The 20th anniversary of the privatization of the Internet deserves recognition by the U.S. Congress and celebration by all Americans as "Internet Independence Day." Two decades ago, on April 30, 1995, the Internet was privatized with the decommissioning of the NSFNET backbone.
By By Daniel Berninger | 29 April, 2015 19:04
IT leaders can't expect to have the upper hand in an outsourcing negotiation. Whether you're negotiating the initial contract, an extension or a change order, the outsourcer normally has the advantage.
By Bart Perkins | 29 April, 2015 04:39
Winston Churchill once said of Russia, "It is a riddle, wrapped in a mystery, inside an enigma." Now, I don't deal with international politics. I just write about technology. But when I've looked at HP lately I've been left thinking of its strategy as, well, "a riddle, wrapped in a mystery, inside an enigma."
By Steven J. Vaughan-Nichols | 24 April, 2015 04:33
Sony is reliving the nightmare that its hacked databases gave rise to late last year, now that Wikileaks has thoughtfully published all of the leaked documents in a searchable database. Really, they are the most courteous hoodlums ever.
By Evan Schuman | 21 April, 2015 19:11
In their introduction to Arc 2.1: Exit Strategies, "Escaping reality," editors Simon Ings and Sumit Paul-Choudhury tell us that "ninety-six percent of the cosmos is ineffable" -- incapable of being expressed or described in words. In addition to reminding us of the widely accepted scientific fact that 96% of our universe is made up by yet-to-be-explained dark matter and dark energy, their point -- I think -- is that it is in our imagination (our ability to make stuff up) that the future lies.
By Thornton May | 21 April, 2015 03:52
Last week, I was horrified to discover a problem with my vulnerability scanner. The product I use relies on a user account to connect to our Microsoft Windows servers and workstations to check them for vulnerable versions of software, and that user account had never been configured properly. As a result, the scanner has been blind to a lot of vulnerabilities. And this has been going on for a long time.
By By J.F. Rice | 13 April, 2015 23:47
What is artificial intelligence (AI), and what is the difference between general AI and narrow AI?
By Kris Hammond | 10 April, 2015 21:13
I've been using email longer than most people (more than a quarter of a century), so I think I have the credibility to say it's overdue for an overhaul.
By Evan Schuman | 06 April, 2015 19:03
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
A guide for security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
- ING Direct unveils Apple Watch app
- Woodside engineers to use IBM's Watson platform
- Technology One records half year revenue of $90m
- Charter reportedly close to $55 billion deal for Time Warner Cable
- Attackers use email spam to infect point-of-sale terminals with new malware
- Large scale attack hijacks routers through users' browsers
- Sharp phone cameras play slow-motion video at 2,100 fps
- DHS data centre consolidation almost completed
- Amazon.com may be working on Etsy competitor
- BlackBerry cutting staff in smartphone unit
- In Pictures: The 8 things we’re looking for at Google I/O 2015
- In Pictures: Hot stuff - The coolest drones
- Hacked Adult Friend Finder database offered for $17,000
- Design thinking, agile development at heart of building control system
- CSIRO opens $6m metal 3D printing centre