IBM and A.P. Moeller-Maersk on Tuesday announced a joint venture to create a platform based on Hyperledger Fabric 1.0, with the goal of creating huge efficiencies in the global supply chain. IBM and Maersk have teamed up to provide a more efficient method of standardizing shipping logistics using blockchain technology. "Adoption of Hyperledger Fabric by Maersk and ... IBM ha...
WikiLeaks on Monday released the first 200 of what it says are 5 million emails stolen from global geopolitical analyst firm Stratfor. The emails, written between July 2004 and late December 2011, reveal Stratfor's web of informers, its payoff structure, payment laundering techniques and psychologic...
Last decade, Steve Jobs was the clear leader, and he ended the decade as the top CEO. We are early in this decade, but already Sam Palmisano has jumped out to an early lead. Like Jobs, it isn't because he is lobbying for this title -- it is because he is already being recognized by peers as being t...
Search engine giant Google is setting up a new venture capital arm and has hired William Maris, a 33-year-old former entrepreneur, to help coordinate the venture fund, according to a report in The Wall Street Journal. Google is the latest in a long line of large companies across several sectors to c...
In Late April last year, about 1 million computers under botnet control started attacking the Estonian government's computers in a denial of service assault. The onslaught continued for three weeks. In the aftermath of this cyber warfare incident, NATO provided the Estonian government with some help...
How do you respond when hit by a cyber attack tsunami? That's the question Cyber Storm II, the most comprehensive cyber exercise ever held in the U.S., was designed to answer. Forty private sector companies, 11 Cabinet-level agencies, 10 states and five countries were involved in the March exercise,...
When Dave Asiala, Dow Chemical's shared services IT director, is talking about his company's RFID initiatives and wants listeners to have an "Aha" moment, he tells them about Dow AgroSciences' use of RFID tags in its in-ground Sentricon Termite Colony Elimination System. "Essentially these are bait ...
Except for those of us who build our own desktop computers, laptops have become the product that increasingly defines our personalities and which one we choose says more and more about who we are. Until recently our choices were defined by vendors: Apple if you favored high design, IBM if you liked...
A number of companies -- start-ups and established firms alike -- are eying the organic RFID tags market. Venture capital firms, like ITU Ventures, are placing seed investment bets on developers with patented prototypes. But despite the hype, the goal of a Radio Frequency Identification (RFID) tag t...
Fuel cell technology for big-ticket consumer items like automobiles is still many years away, based on numerous industry reports. However, the day when portable devices like laptop computers, PDAs and cell phones can run for extended time periods without refueling is indeed much closer. High-demand ...
On all accounts where it's available
Limited to critical accounts like banking and email
Only when enforced by the service provider
Plan to start using soon
Prefer not to use
What is two-factor authentication?
Enter your Username and Password to sign in.