Security experts were not surprised about the disclosure of the IRS breach, which they say raises questions about the tax agency's incident response.
IBM announced several new design and analytics capabilities as part of IBM Marketing Cloud to enable brands to address the rising complexity marketers face engaging with customers as individuals. Announced at the IBM Amplify 2015 conference in San Diego recently, these new capabilities from IBM enable marketers to collaborate on, design and deliver customer experiences with a focus on personalization. With the new capabilities, brands of all sizes can take advantage of IBM analytic insights generated from every single interaction regardless of where the brand engages with the customer—from the first moment a customer interacts with a brand in a store to researching comparable items and pricing online to sharing feedback on their experience with the brand on a social channel, IBM said. "Marketers are the gatekeepers to the customer and have the opportunity to understand each individual and guide them on the path through a mix of campaigns designed to nurture brand loyalists," said Deepak Advani, general manager of IBM Commerce. This slide show looks at the some of the highlights from the Amplify conference.
A team of U.S. and European Internet scholars urges Google to be more transparent in handling requests filed under the EU's Right to Be Forgotten mandate.
As another Mother's Day quickly approaches, you may be thinking about how your mom helped steer you on the right course. She got you to eat your vegetables, stop listening to that awful music and, of course, was there when you started your career. When IT management software provider asked its Thwack Community of over 130,000 IT pros to weigh in on how their moms helped them "become the IT pro you are today," the response was overwhelming. The anecdotes show that IT pros truly do have great appreciation and gratitude for their mothers. Whether or not mom was interested in (or even understood) technology, she provided encouragement, support and financing to pave the road for her sons and daughters to pursue their love of technology. And there were a few tech-savvy moms represented in the group as well. While some of the IT pros who shared their experiences started out their tech support career by helping their moms, others were brought into it by their moms being early adopters of tech themselves. Inspired by the popular Internet meme, "Texts from Mom," this eWEEK slide show reinterprets real responses SolarWinds got as a humorous way to pay homage to the mothers who were there all along. Without their support, organizations everywhere would be lacking you, the talented IT pros they have today.
Oracle’s co-CEO’s Mark Hurd and Safra Catz say the company's advantage in cloud computing platforms will enable it to overtake SAP as the sop seller of enterprise applications.
The tablet's popularity—with more than 285 million tablets in the marketplace, by ABI Research's estimates—has made mobile computing a greater priority for businesses. For example, 58 percent of retailers list mobility among their key initiatives, according to Forrester. Tablets and other mobile devices empower employees with instant access to information, regardless of their location. And as mobile technology continues to proliferate in business today, companies are looking for new ways to integrate these devices effectively, without compromising already-tight IT budgets. Sharing devices among employees is becoming a more popular way to help cost-conscious organizations across industries, ranging from education and manufacturing to heath care and retail, embrace the mobile era. This slide show, compiled using input from IBM, examines examples of how sharing mobile devices provides cost savings and other operational benefits. We also look at best practices companies should embrace when deciding how to best implement a shared-device environment.
Despite lower-than-expected revenues and profits in Q1, Google's stock price remains strong.
The China-based computer maker announced some 40 new smartphones, laptops, tablets and other devices at a global product event in New York City on April 23.
At IDC's annual RSA conference breakfast meeting, analysts reveal what has changed and what has remained the same in the security landscape.
Cylance researchers provide new details into how Sony was hacked, and the allegation is that a phishing attack against Apple IDs was at the root of the attack.
While paying rewards to vulnerability researchers to find flaws in software works initially, mature software needs a different approach, according to a team of academic and industrial researchers.
NEWS ANALYSIS: Security researchers find new malware that exploits legitimate advertising channels to attack and compromise computers.
When it comes to business continuity for most enterprises, a physical appliance sits at the center of the data center. Most IT departments use disk-to-disk (D2D) hardware and replication of some sort as the main protection for backup and recovery of critical data, servers and applications. While D2D backup has its shortcomings, including high capital cost, capacity planning challenges and finite storage constraints, it's generally tested, trusted and reliable. It's the convention. With these same services in a cloud model becoming more broadly adopted, many enterprises are considering hybrid cloud backup as a viable option for their data protection needs. Who doesn't want lower costs and increased efficiency? It's a crowded market, so understanding the top requirements will be the key to architecting a hybrid cloud backup and recovery solution that ensures fast and reliable data protection, with the cost savings. In this slide show, developed using eWEEK reporting and industry insight from cloud-based service provider Infrascale, we bring you some important considerations when planning a new-gen business continuity system.
Linux hits a new milestone, as live kernel patching lands in the new release. Linus Torvalds, however, doesn't see a lot of special new features in Linux 4.0.
According to FireEye's APT30 report, the Chinese government-backed group has been active since 2005.