| Making the case for Amazon to release its cloud revenues The past few weeks have been earnings season, meaning publicly-traded companies reveal their latest financial results for the second quarter of the year.In the cloud computing industry, some companies like Microsoft are flaunting their results. Microsost made just under $1 billion in the quarter from its cloud, and the company now expects to make up to $4.4B off its cloud practice this year.But other companies aren't as forthcoming with the financials behind their cloud products. And yes, we're talking about you Amazon.+MORE AT NETWORK WORLD: Amazon's warming up to hybrid clouds+To read this article in full or to leave a comment, please click here Read More WEBCAST: Cisco Systems
Innovations that Protect Against Advanced Attackers This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >> WHITE PAPER: EMC Corporation The Big Data Security Analytics Era Is Here Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution. Read this paper for key trends and conclusions in the big data security era. Learn more. Comcast's silly propaganda helped kill municipal broadband projects A little more than 10 years ago, Comcast stuffed mailboxes in Batavia, Illinois, in the weeks leading up to a vote on a referendum measure attempting to establish a municipal broadband network, warning of failed projects and other horror stories.The fliers, one of which can be seen above and others which are published at Motherboard, likened municipal broadband to "ghosts" and "goblins," claimed that the referendum proponents didn't even have a business plan for the project, and, strangely, implied that the local women who voted in favor of it didn't understand their priorities.To read this article in full or to leave a comment, please click here Read More Internet of things devices contain high number of vulnerabilities, study finds Security researchers from Hewlett-Packard found 250 security issues when analyzing 10 popular IoT devices Read More 64-bit Google Chrome browser moves into beta Google's 64-bit Chrome browser took the last step before being formally released, as Google published a 64-bit beta of the browser on Wednesday morning.If you'd like, you can visit Google's 64-bit Chrome beta page and download the new browser; Google promises that all of your saved information (passwords, bookmarks and the like) will migrate over. (Google announced 64-bit versions of the browser in its Dev and Canary channels in June.)Google Graveyard: Here's what Google has killed so far in 2014 Why do you need a 64-bit Chrome browser? At this point, that's a bit of an open question. Chances are that your PC's microprocessor and operating system (Mac, Windows, or Linux) shifted over to 64-bit technology years ago. In general, 64-bit addressing opens up the ability for software to use more than 4 gigabytes of RAMthe maximum a 32-bit application can addressplus some performance improvements.To read this article in full or to leave a comment, please click here Read More Red Hat aims at standardization with Linux for 64-bit ARM servers Red Hat has developed a version of the Linux operating system that can be used to test chips and associated hardware based on the ARMv8-A 64-bit architecture for servers with the aim of standardizing that market.Based on the company's Red Hat Enterprise Linux (RHEL), the Linux distribution is part of a partner program that Red Hat launched Wednesday for potential ARM hardware vendors."We don't call it RHEL, but it is a functional, unsupported, operating system for partners to use in their development activities," said Mark Coggin, Red Hat senior director of platform product marketing.To read this article in full or to leave a comment, please click here Read More Tor hints at possible U.S. government involvement in recent attack Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine. Dingledine said that it's possible the attack wasn't carried out with malicious intent, although the effect is harmful in any case, potentially weakening Tor's encryption and making it more vulnerable to a state actor attempting to compromise it. +MORE ON NETWORK WORLD: Superclass: 14 of the world's best living programmers | Zero-day flaws found in Symantec's Endpoint Protection +To read this article in full or to leave a comment, please click here Read More Dept. of Energy hunting fault tolerance for extreme scale systems The immensely powerful supercomputers of the not too distant future will need some serious fault tolerance technology if they are to fulfill their promise of ingenious research.That's why the U.S. Department of Energy 's Office of Advanced Scientific Computing Research this week said it is looking for "basic research that significantly improves the resiliency of scientific applications in the context of emerging architectures for extreme scale computing platforms. Extreme scale is defined as approximately 1,000 times the capability available today. The next-generation of scientific discovery will be enabled by research developments that can effectively harness significant or disruptive advances in computing technology."To read this article in full or to leave a comment, please click here Read More 10 technologies that will transform PCs in 2015 and beyond The PC's future is so bright, you gotta wear shadesYou might write off PCs as archaic or boring. You might take for granted that they'll get faster, lighter, more power-efficient and more convenient to use over time.But if you stop and consider all the things that go into making a computer better, there's actually a lot to be excited about. Here are 10 PC advancements that will transform PCs over the next several years.To read this article in full or to leave a comment, please click here Read More Antivirus products riddled with security flaws, researcher says It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.According to Joxean Koret, a researcher at Singapore security firm COSEINC, antivirus programs are as vulnerable to attacks as the applications they're trying to protect and expose a large attack surface that can make computers even more vulnerable.Koret spent the last year analyzing antivirus products and their engines in his spare time and claims to have found dozens of remotely and locally exploitable vulnerabilities in 14 of them. The vulnerabilities ranged from denial-of-service issues to flaws that allow potential attackers to elevate their privileges on systems or to execute arbitrary code. Some bugs were located in antivirus enginesthe core parts of antivirus productsand some in various other components.To read this article in full or to leave a comment, please click here Read More 'Right to be forgotten' ruling is unworkable and misguided, UK Lords say The UK government should fight to keep the 'right to be forgotten' out of future EU data protection regulation, the Lords said Read More Microsoft reveals Windows Phone 8.1's first update, with welcome new features Microsoft formally unveiled Windows Phone 8.1 Update early Wednesday morning, confirming features such as Start screen folders, sandboxed apps, and even a handy VPN function for surfing over public Wi-Fi connections.Those who opted in to the Developer Preview will be able to download the update next week; otherwise, consumers with stock Windows Phone 8.1 devices will have to wait a couple of months until it can be formally tested and deployed by carriers. Sources had revealed previously that the update, known formerly as Windows Phone 8.1 GDR1, wouldn't be earth-shattering. But there's enough there that it should be a must-have for Windows Phone owners, as evidenced by a blog post authored by Joe Belfiore, the Microsoft vice president in charge of Windows Phone.To read this article in full or to leave a comment, please click here Read More | |
No comments:
Post a Comment