Daily Video: Apple Reportedly Eyeing Electric Car Production

Apple is looking to diversify its business into electric car production, possibly by as soon as 2020, as the company explores new business opportunities outside of its core consumer technology and PC, tablet and smartphone businesses.

The New York Times reported that Apple has been recruiting about 200 people from both inside the company and from competitors like Tesla to help them develop new electric cars.

The Apple Watch is priced at $349, which sounds reasonable compared to the prices of competing watches from LG, Sony, Motorola and other manufacturers.

However, premium versions of the Apple Watch— which could sell for as much as $5,000 or $8,000 or more— are being touted in some industry reports. This is leading some to wonder if there is a market for such pricey watches and if these premium versions will be worth the cost.

Data lakes are the newest hot-button term in the IT business world. These are massive, easily accessible, centralized repositories of large volumes of structured and unstructured data. EMC has had its own Data Lake Foundation strategy for several months, and recently made a few announcements about it.

For example, the new Isilon HD400 allows customers to scale their data lakes to 50 PB within a single cluster. Also, EMC announced a new version of its OneFS operating system, v7.2, which supports newer and more current versions of Hadoop protocols.

Organizations around the world have deployed a wide range of technologies to protect network infrastructure and endpoints from security risks.

Technology, however, isn't the only risk that needs to be secured. A new report from Intel Security, titled "Hacking the Human Operating System," explained the role of social engineering within cyber-security. Intel Security explains that there are two main types of social engineering attacks: hunting and farming.

In hunting attacks, the culprits are looking to gain information and exploit the user with minimal interaction while. In farming attacks, the malicious hackers seek to build a relationship with the victim and then extract information over time. Email is a leading culprit in attack vectors for all types of social engineering.

Top White Papers and Webcasts