Yearly Archives: 2017

iPhone Aging Battery Performance

Apple Offers Apology, Replacement Deal for Tired iPhone Batteries

0
Apple iPhone, iPad and MacBook users now have a more complete picture of what happens to the batteries in their devices as they age,...
IoT.security

Predictions 2018: Internet of Things Will Expand as Threat Vector

0
We’ve published a list of “prediction” articles here in eWEEK during the last few weeks as 2018 bears down upon us. We’ve touched on...
Microsoft Kubernetes Components

Microsoft Adopts Kubernetes to Scale Machine Learning Cloud Workloads

0
Add Kubernetes to the growing list of technologies that Microsoft is using to push the boundaries of cloud-based artificial intelligence.Kubernetes, the popular open-source container...
IBM Quantum Computing Efforts

IBM Making Progress in Quantum Computing With Q Systems

0
A lot has been written about IBM’s efforts in such emerging technologies as artificial intelligence, machine learning, analytics, blockchain and the cloud, much of...
Microsoft Biometric Security

Microsoft Campaign to Make Passwords Obsolete Starts at Headquarters

0
Microsoft wants to make passwords a thing of the past and it's a mission that begins at headquarters.The majority of the company's workforce has...
Microsoft Kubernetes Components

2017 Year in Review: Kubernetes Enables a Multi-Cloud World

0
In 2017, there was one area of the cloud landscape that received more attention than nearly all others—Kubernetes. Kubernetes' roots go back to 2014, when...
Daily Tech Briefing Dec. 28

Digmine Malware Uses End-User Systems to Mine Cryptocurrency

0
Today’s topics include Trend Micro's warning to Facebook Messenger users about a cryptocurrency mining campaign; Whitehouse.gov's switch from the Drupal to WordPress website content...
DDoS.attack.YouTube

Recognizing the Most Common DDoS Attack Vectors in an IT System

0
Distributed denial-of-service (DDoS) attacks aren’t anything new; they’ve been around for decades. The public at large, however, has only become aware of them since...
IoT security

Security Flaws Found in Sonos Internet Connected Speakers

0
Time and again over the course of 2017, security researchers have looked for and found security flaws in internet of things connected devices. The...
bitcoin

Digmine Malware Steals Your Computer Power to Mine Crypto-Currency

0
When new crypto-currency mining malware was discovered this week, the first reaction by many security managers was probably one of confusion. While most people...