Social proof is an individual influencer or group clout that gives "proof" to a product. It is based on the principle that people tend to follow and conform to an influential person or a majority. They do this to be validated -- a result of a need for safety. Here are 10 kinds of social proof strategies -- and how and why they work...
The next generation of Intel mobile processors will include malware protection built into the chip. The protection, provided by Intel's Control-Flow Enforcement Technology, will first be available in the company's "Tiger Lake" mobile processors. CET is designed to protect against the misuse of legit...
Amazon has announced Project Zero, a program that empowers vendors to help drive counterfeits down. The anti-counterfeit campaign will employ Amazon's advanced technology, machine learning and innovation. Amazon will partner with Project Zero's participating vendors to protect their intellectual pro...
Google this week debuted a slew of new capabilities for Google Assistant at CES in Las Vegas. The new Connect platform lets device manufacturers incorporate Assistant into their products easily and cost-effectively. Connect uses Google's existing smart home platform to expand to new device types, wh...
We rely on our phones to process and store reams of personal digital data. Our digital activities -- from checking bank balances to paying for a product with a tap of the screen, to sending friends and family messages over social media, to accessing work emails remotely -- have turned our phones int...
McAfee has introduced its Cloud Workload Security v5.1, which represents the first solution for open source containers. McAfee CWS v5.1 secures Docker workload and servers in public and private cloud environments by quarantining infected workloads and containers in a single click. "McAfee Cloud Work...
Andrew McAfee and Erik Brynjolfesson, who teach at MIT's Sloan School of Management, started writing about the impact of artificial intelligence and machine learning almost a decade ago. Their early books -- The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies a...
SentinelOne this week announced a partnership with Microsoft to bolster threat protection for mixed platform users, making computing safer for Linux machines in a multiplatform workplace. SentinelOne will integrate its Endpoint Protection Platform with Microsoft's Windows Defender Advanced Threat Pr...
Salesforce earlier this year introduced its Einstein Vision capability, an idea with a lot of promise but not a great deal of precedent. Who had applications that could see, and how would this be used? For decades, we've been content with scanning documents and analyzing them with optical character ...
How many times have we been lulled into complacency over getting a project or a product done but not necessarily well received, because it was someone else's gig? This is a great reminder that the job isn't done simply because we produce something and shove it out the door. It's also a cue to pay cl...
Yes - I'm more likely to buy with flexible payment options.
Sometimes - It depends on the item and terms.
Rarely - I typically prefer paying upfront to avoid debt.
Not at All - My purchase decisions are based on need and budget.
Enter your Username and Password to sign in.