Last week, I was horrified to discover a problem with my vulnerability scanner. The product I use relies on a user account to connect to our Microsoft Windows servers and workstations to check them for vulnerable versions of software, and that user account had never been configured properly. As a result, the scanner has been blind to a lot of vulnerabilities. And this has been going on for a long time.
By By J.F. Rice | 13 April, 2015 23:47
What is artificial intelligence (AI), and what is the difference between general AI and narrow AI?
By Kris Hammond | 10 April, 2015 21:13
I've been using email longer than most people (more than a quarter of a century), so I think I have the credibility to say it's overdue for an overhaul.
By Evan Schuman | 06 April, 2015 19:03
Google Executive Chairman Eric Schmidt shocked everyone last week by telling The Wall Street Journal that Google isn't killing Google Glass.
By Mike Elgan | 06 April, 2015 05:04
Enough is enough. Apple's iOS 8 mobile operating system came out in mid-September. Since then, the company has delivered seven -- count 'em, seven -- patch releases, and iOS 8 still doesn't work that well. Argh!
By Steven J. Vaughan-Nichols | 03 April, 2015 20:17
Over the past 5-yrs, organizations have complained about Microsoft Outlook calendaring problems where users describe issues of calendar appointments not showing up, meeting appointments disappearing, calendar delegate issues occurring, just overall "odd" behavior of calendars. It usually happens in mixed environments where some users are Apple Mac users, and some users (frequently the exec admin / delegate) running Windows, and typically active use of iPhones, iPads, Android, or other mobile devices and tablets. And over the past 5-yrs, I have actively blogged about the problem and the solution to FIX the calendaring inconsistencies.
By Rand Morimoto | 02 April, 2015 00:21
Now that net neutrality is the law of the land, you may feel inclined to pat yourself on the back for a job well done. After all, a big reason the FCC backed net neutrality was the outpouring of support for it.
By Preston Gralla | 31 March, 2015 05:59
Now we know why Facebook ripped Messenger out of the mobile version of the Facebook app last April: Messenger was destined to become a "platform" in its own right, complete with an API and developer program to help and encourage software companies to make Facebook Messenger-specific apps.
By Mike Elgan | 28 March, 2015 22:08
Back in the dark ages, when the only way to get onscreen entertainment was by tuning in a television set at a specific time (get home late? miss your favorite show? too bad for you!), networks had a habit of scheduling similar shows opposite each other. The notion was presumably, that the competition would cause one show to win out over the other, which would eventually drop in the ratings and get cancelled. The idea that viewers might be interested in seeing both apparently was not in the networks' psychology.
By Barbara Krasnoff | 27 March, 2015 05:01
It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to exploit child labor, run sweatshops or avoid taxes and rigorous health and safety inspections. Now the U.S. government says something similar is happening in regards to email.
By Evan Schuman | 18 March, 2015 01:56
You're going to be hearing a lot about a new app called Meerkat.
By Mike Elgan | 16 March, 2015 05:00
Though she may have broken no laws, Hillary Clinton acted irresponsibly in using a personal email account to conduct official U.S. government business in her capacity as secretary of State.
By Kenneth van Wyk | 13 March, 2015 08:01
Lenovo pre-installing Superfish software was a security disaster. Whether Lenovo was evil, or, as they eventually claimed, merely incompetent, it's hard to trust them going forward. If nothing else, their initial denials that anything was wrong, leave a lasting impression. Of course, Superfish, along with the software that they bundled from Komodia, also deserve plenty of blame for breaking the security of HTTPS and SSL/TLS.
By Michael Horowitz | 10 March, 2015 00:07
Organisations that were born digital are built around their IT platform, and all their business processes are IT-driven and data-powered. Every action, every decision, is based on the processing of data sets about users and customers, about usage patterns, external conditions, etc.
By Yves de Montcheuil | 07 March, 2015 05:44
On Feb. 26, the Federal Communications Commission voted, along strict party lines, to approve new net neutrality rules by reclassifying broadband as a regulated public utility. So does that save the Internet or lock it up in a bureaucratic, censored, expensive prison?
By Steven J. Vaughan-Nichols | 06 March, 2015 22:49
Smartphone makers like Apple, Samsung and others have flirted with different materials to make their smartphones -- metal, plastic, even glass front and back with the iPhone 4 line.
By Mike Elgan | 28 February, 2015 23:12
Several electronic and mobile payment options have become available, but most of us in the U.S. are still using plain-vanilla credit and debit cards with magnetic stripes. They use technology that dates to the first Nixon administration. That's not a problem in itself; I have no problem with time-tested security measures that work effectively. But just look around: Data breaches are everywhere, and those magnetic-stripe cards are often implicated.
By Kenneth van Wyk | 27 February, 2015 03:07
President Obama's secret plan to protect the "open Internet" is locked inside the Federal Communications Commission. We don't know what's in the 322 pages, but we are told it includes a transparency rule.
By By Bret Swanson | 26 February, 2015 01:04
Toys always reflect the larger culture -- its biases, fears and, most of all, its technology. New York's Toy Fair 2015 happened this week, and the latest round of new tech toys is bringing some of the most disturbing tech trends to children.
By Mike Elgan | 24 February, 2015 06:28
Everyone knows that Apple had a great fourth quarter and that its most successful product line, the iPhone, is doing better than ever, too.
By Mike Elgan | 17 February, 2015 04:21
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- Google's Project Loon close to launching thosands of balloons
- Shape-shifting robot reveals secrets of Fukushima reactor
- FCC faces seventh net neutrality lawsuit
- Next on the Office expansion list: Windows 10 phone apps
- Why investors are so excited about Slack
- First Apple Watch health IT apps bring important messages to the wrist
- Insurance company now offers discounts -- if you let it track your Fitbit
- Apple's 12-inch MacBook can use third-party USB Type-C cables
- Gurucul identifies cloud threats based on identity, behaviors
- Microsoft shows impressively accurate hand-tracking system for VR
- Docker update speeds and organizes container deployments
- Facebook tries to keep it real by killing more 'fake' likes
- Feds lay down social media rules; enterprises should, too
- Should computers determine how our kids learn to talk? Maybe not
- Keep Windows 10 preview up to date -- or face a dead PC