Content Tags Index Page - Page 4
The 2018 Hacker-Powered Security report reveals that there has been an increasing volume of critical security vulnerabilities reported by researchers in the past year.
DAILY VIDEO: Chinese chip maker Hygon builds x86 chips modeled on AMD's Epyc design, and Microsoft introduces its Surface Go 10-inch 2-in-1 tablet for $399.
The Xeon E-2100 processors round out a chip lineup that includes Xeon Scalable Processors and Xeon W chips for high-end and midrange workstations.
An Accenture study reveals that chief information security officers are lacking authority and visibility to effect change within their organizations.
SOLUTION ANALYSIS: How does a high-visibility international apparel maker/retailer create a digital showroom available anywhere in the world and easily replicable to match company growth? Couchbase provides the answer in this use case.
Designed to thwart cyber-security breaches in large enterprise data centers, Hopzero provides a new layer of security protection to complement access-based security solutions.
eWEEK HOW-TO FEATURE PART 2: There are a lot of things that you can change in a computer as complex as a professional workstation to make it run better, but not all of them will make a lot of difference.
Salesforce.com has updated Service Cloud Einstein with advanced bots for handling routine customer inquiries and guided services, such as Next Best Action, to help customer service agents identify products and services customers may be ready to purchase.
Google’s page verification tool can help organizations discover data loss and corruption earlier in the change cycle, company says.
SpaceBelt’s data security as a service and SpaceChain’s blockchain-based satellite network soon to bring new infrastructure for cryptocurrency security, data storage.