Instagram clarifies rules to ban revenge porn

Instagram is clarifying its rules around sexual, illegal and other inappropriate content, including posts involving revenge porn.

By Zach Miners | 17 April, 2015 05:48

Tags: Internet-based applications and services, Instagram, social networking, mobile, social media, internet, video, Facebook, mobile applications

Size matters in mobile, but Nokia may find bigger isn't better

Size is power in the mobile networks business, but it's only one of the reasons Nokia is acquiring Alcatel-Lucent.

By Stephen Lawson | 17 April, 2015 05:44

Tags: business issues, Huawei Technologies, Ericsson, alcatel-lucent, Networking, Nokia, mobile, Mergers and acquisitions

Docker 1.6 caters to dev and ops alike with new features

Docker has adopted the "ship early and often" mantra of software developers, but it isn't just shipping a new version of the Docker client a mere two months after the last one. Instead, it's offering up a major architectural change in Docker image delivery -- a clear sign Docker's success is forcing it to keep pace with its customers' real-world needs.

By Serdar Yegulalp | 17 April, 2015 05:34

Tags: application virtualization, Docker, Origin, virtualization, Google

IBM unbolts vast threat database to fight cybercrimes

IBM today took cybersecurity threat sharing to a new level it opened its vast library of security intelligence data to public or private entities building defenses against cybercrimes.

By Michael Cooney | 17 April, 2015 04:37

Tags: cybersecurity, IRS, IBM, security, legal, cybercrime

Microsoft and Yahoo shake up their search deal

Nearly six years after Microsoft and Yahoo inked a search partnership, the companies are extending their agreement while changing it up a bit, as well.

By Sharon Gaudin | 17 April, 2015 04:37

Tags: search, Yahoo, Microsoft, bing, internet, search engines

IBM opens up its threat data as part of new security intelligence sharing platform

IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other network defenders.

By Lucian Constantin | 17 April, 2015 04:03

Tags: Detection / prevention, intrusion, IBM, security, AlienVault, Exploits / vulnerabilities, malware, Facebook

Does your company run on open-source software? Join the (very large) club

Every year, open-source software "eats" more of the business world.

By Katherine Noyes | 17 April, 2015 03:37

Tags: open source, Lou Shipley, Black Duck Software, Paul Santinelli, North Bridge, software

Wikileaks publishes hacked Sony emails, documents

Wikileaks has published a searchable database of thousands of emails and documents from Sony Pictures Entertainment that were leaked in late 2014 after the studio was attacked by hackers.

By Martyn Williams | 17 April, 2015 03:35

Tags: security, Sony Pictures Entertainment, legal, wikileaks

Google takes on real-time big data analysis with new cloud services

Google is betting that real-time processing is the future of big data analysis, and has updated two of its cloud services to help enterprises understand what is happening in the moment with their customers and operations.

By Joab Jackson | 17 April, 2015 02:58

Tags: Google, Managed Services, cloud computing, internet

Forever 21 denies pirating Adobe software, strikes back

Retail chain Forever 21 has denied making illegal copies of Adobe's software, as the Photoshop maker alleged in a lawsuit, and shot back that Adobe tries to bully customers who are accused of piracy into paying exorbitant license fees.

By James Niccolai | 17 April, 2015 02:39

Tags: applications, intellectual property, copyright, Adobe Systems, legal, software

Data breach notification bill could weaken consumer protections

Legislation that would require businesses across the U.S. to notify affected customers after a data breach is headed toward a vote on the floor of the House of Representatives even though some digital rights groups say the bill will actually weaken protections for consumers.

By Grant Gross | 17 April, 2015 02:01

Tags: Laura Moy, New America Foundation, Marsha Blackburn, Consumers Union, Peter Welch, U.S. Federal Communications Commission, legislation, government, Barack Obama, Electronic Frontier Foundation, security, U.S. House of Representatives, data breach

Sophos takes rare step of citing Microsoft flaw as a must-fix

Sophos generally steers clear of pointing to a single patch from Microsoft's Patch Tuesday, but is breaking its own rule this month by highlighting one it says can prevent a world of hurt.

By Tim Greene | 17 April, 2015 01:25

Tags: sophos, Microsoft, security

Meet the new leader of Debian open source project

Neil McGovern is the new leader of the Debian open source/free software project after defeating two rival contenders in a vote held among developers that closed on Wednesday. He takes over from Lucas Nussbaum, who did not seek re-election after two years at the helm.

By Jon Gold | 17 April, 2015 01:10

Tags: open source, software, debian

Apple's new Retina MacBook is 'repair nightmare'

Apple's new 12-inch MacBook is a "repair nightmare," as tough on do-it-yourselfers as 2012's first Retina-equipped MacBook Pro, according to iFixit.

By Gregg Keizer | 17 April, 2015 01:06

Tags: Apple, iFixit, hardware systems, laptops, apple mac

Tech pros' favorite tools increase IT efficiency

Content is core to the work of Densho, an organization whose mission is to preserve the testimonies of Japanese Americans who were held in internment camps during World War II.

By Ann Bednarz | 17 April, 2015 01:04

Tags: management, Densho, storage, Networking, infrastructure management

Top Whitepapers

Featured Whitepapers