The U.S. departments of Justice and Homeland Security on Monday announced they were investigating reports that a hacker broke into government computer systems and stole sensitive information about employees at the agencies. The hacker posted stolen information for about 9,000 DHS employees online Sunday and made public data on 20,000 FBI employees Monday. "We are looking into the reports o...
Cellphone videos have become a widely used tool to document everything from kids' antics to police brutality. They are shaking up the TV news industry, and they soon may revolutionize customer relationship management. Take, for instance, LogMeIn's video-aided support tool, Rescue Lens, or Support.co...
Cyberdefenders for years have adopted Fort Apache strategies to protect their networks. Strong perimeters could prevent attackers from reaching precious data, they reasoned. As technology marched on, however, the idea of an impermeable wall became as quaint as the Maginot Line on the eve of World Wa...
Open source is sitting at the head of the class in a growing number of schools with all levels of education. Its no-cost starting point and use-it-your-way flexibility gives open source technology an advantage over proprietary solutions with its no-license and no-fee lesson plan. For many education ...
IBM is massively increasing its commitment to Watson, which was evident at last week's IBM Think Forum. IBM recognizes that if it can get a product that thinks first, then it can again take absolute control over the technology market, and every other company will be chasing it again. It is making so...
A new wave of opportunities is emerging to create industry-specific Software as a Service and cloud computing vertical market solutions. A number of new examples of this phenomenon have crossed my radar over the past few weeks which clearly illustrate the long tail effect of the cloud. The most prom...
New tools are available to help with service level management, but they require a new perspective on how IT infrastructure components should be managed. The key is to embrace a new ideal of managing every infrastructure component from the perspective of how it impacts end-user service levels. By inc...
Still smarting from a recent attack on its systems, Facebook started its week with a discovery by researchers at Bitdefender that an infected add-on at the Chrome Web Store was planting malware on its members' computers. The malware, among other things, was padding the Like counts on dummy Facebook ...
Did you hear? McDonald's has just acquired Burger King! Also, someone at the company apparently has a potty mouth. Another unusual and unexpected corporate trade also happened last week -- Cadillac acquired Jeep. These events, of course, didn't really happen. In both instances, hackers gained contro...
Accessibility of service
Convenience in any situation
Cost-effectiveness
Eco-friendliness
No need for parking
Safe ride when having too much fun
Enter your Username and Password to sign in.