Monthly Archives: February 2017
New Aerohive Access Points Simplify Mesh Network Setup for SMBs
The new series of wireless access points from Aerohive Networks is designed and priced to provide enterprise grade mesh networking to small and medium...
Evernote Makes Notetaking Frictionless in iOS App Revamp
The latest of version of Evernote for iOS not only looks different, it streamlines many of the popular app's note taking and content capture...
EU Certifies Google Data Transfer Contracts Comply With Privacy Rules
The contractual clauses that Google uses to cover international data transfers for European customers of its G Suite applications and its cloud services have...
Windows 10 Cloud Leak Points to Potential Chrome OS Fighter
Chromebooks, inexpensive notebook PCs powered by Google's Chrome OS, are becoming an increasingly common sight, particularly in schools.A Web leak that made the rounds...
TiVo’s Analytics Pinpoint Highlights of Super Bowl LI
Years ago, whenever the television networks needed to find out where their successes and failures were, they sought out one main source to provide...
Snap Inc. Files for an IPO Worth an Estimated $3 Billion
Today's topics include Snap Inc.’s official announcement that it will go public on the New York Stock Exchange in March, the addition of new...
More Software Vulnerabilities Disclosed in 2016 Than Ever Before
More Software Vulnerabilities Disclosed in 2016 Than Ever Before
Risk Based Security's software vulnerability report for 2016 shows find that the number of new flaws...
What Investors Should Know About Snap’s Initial Public Offering
What Investors Should Know About Snap's Initial Public Offering
Snap, parent company of the Snapchat social photo sharing service, has filed papers for what could...
Guide to Tiered Storage in 2021
For more than two decades, the IT storage business has been built upon the idea of tiered storage, with "hot" data, backup and archiving...
Carbon Black Brings Event Stream Processing to Security Platform
For much of the history of anti-virus technology, the focus has been on determining if certain files, embedded in documents or downloaded from the...