Home 2016
Yearly Archives: 2016
Anomali Debuts Free Tool for STIX/TAXII Threat Intelligence Feeds
Security firm Anomali announced on Nov. 21 the debut of its new free STAXX tool to receive threat intelligence feeds.In the world of threat...
10 Add-On Skills to Teach Virtual Assistant Alexa on Amazon Echo
10 Add-On Skills to Teach Virtual Assistant Alexa on Amazon Echo
Amazon Echo owners can teach the Alexa virtual assistant many new skills beyond playing...
10 Electronic Devices in High Demand This Holiday Season
10 Electronic Devices in High Demand This Holiday Season
From high-end PCs such as the MacBook Pro to smart speakers with trainable virtual assistants such...
MapR Launches Analytics Package Backed by Data Scientists
Need a data scientist to help solve a marketing or sales analysis problem?Converged data platform provider MapR Technologies on Nov. 22 announced the launch...
How to Protect the Encryption Keys to Your Kingdom
Tatu Ylönen, CEO and founder of SSH Communications Security, was clearly frustrated as we talked over lunch. “Why can’t I get through to them,”...
Alfresco Offers Early Availability for Its AWS Deployment
Content management and business process management software provider Alfresco Software is now in the process of making its products available via the Amazon cloud.The...
Both HPs Report Mixed Earnings Results in First Year Apart
The split-up versions of what was the iconic Hewlett-Packard Co. for 76 years (from 1939 to 2015) turned in their Q4 and fiscal year...
Microsoft Holding Black Friday Sale for Surface PCs, Tablets, Phones
Microsoft has started its Black Friday sale a little early this year, but buyers hoping to save some cash on the company's newly announced...
Why Microsoft Picked SAP SuccessFactors for Its HCM Needs
SAP's cloud-based human capital management scored a major new customer recently. Last week, German business software giant announced that Microsoft had selected its SuccessFactors...
Cerber Ransomware Expands Database Encryption Attacks
Ransomware authors aim to make money by encrypting user files and then demanding that users pay a ransom for the safe return of their...