Pro Top-level domain expansion a security risk for business computers Auto proxy config requests can leak to the public Internet from corporate PCs 26 May
Pro Salesforce brings cross-channel service a step closer with new ‘Snap-ins’ One module offers two-way video chat, so customers and agents can see each other 26 May
Pro Google’s Abacus API adds security by subtracting passwords Shifting the authentication burden from users to their Android devices, the API will be available to developers by the end of the year 26 May
Pro New ransomware ramps up for widespread attacks New version of DMA Locker fixes known flaws and adopts new exploit kit-based distribution model 25 May
Pro Google opens Polymer toolbox for progressive Web apps Polymer App Toolbox helps developers build nativelike mobile systems 25 May
Pro Criminal defendants demand to see FBI’s secret hacking tool Courts are facing a decision: expose the FBI's techniques or allow defendants to see the evidence against them 25 May
Pro AI, apps and ball bots – DCU project expo 2016 With more projects than ever before, DCU’s annual final year project expo attracts a host of prospective employers 24 May
Pro Cray to light your Big Data fire New Urika-GX is tuned for highly iterative and interactive analytics 24 May
Pro Microsoft updates Dynamics CRM with a new IoT twist A Connected Field Service tool focuses on predictive maintenance 24 May
Pro Container platform Kubernetes gets more enterprise-ready Managing containers at scale for more enterprise workloads 23 May
Pro Microsoft pledges more renewable energy use in DCs Goal is for 50% wind, solar, hydropower by the end of 2018 23 May
Pro Dell’s makes its own storage arrays see eye to eye With new software, Storage Center and EqualLogic systems get common management and replication 20 May
Pro Schneider Electric improves DCIM suite StruxureWare Data Center Operation v8.0 extends asset visibility across different users 20 May
Pro Open source tool watches Linux systems, containers for suspicious activity Sysdig’s Falco sends alerts of unwanted behaviours, not just in Docker apps, but throughout the system 20 May
Pro HPE focuses on data security for governments and global enterprise With GDPR on the horizon, standards-based services address 20 May
Pro Larger businesses outstripped by SMEs in home working Magnet survey finds cloud take up increasing, but bigger businesses are lagging on home working 19 May
Pro IT pros think CEOs should be held responsible for data breaches Growing sentiment among UK IT decision makers that the top dog should take the blame 19 May
Pro Google tools make for easier app integration with its spreadsheets and slides New APIs make it possible to programmatically create spreadsheets and presentations 19 May
Pro SAP aims to simplify IT with more powerful Hana version Graph data processing helps users visualise the connections among people, places, and things 19 May
Pro Hacker hawking 167m LinkedIn user records Old hack data includes hashed passwords for millions of accounts that likely date back to 2012 18 May
Pro Microsoft and SAP deepen partnership with Azure and Office integrations Updates include support for SAP HANA on Azure and a new Outlook add-in for Concur 18 May
Pro Cybercriminals increasingly embrace sophisticated business models Criminal hacking groups can employ HR specialists, marketers and training gurus, HPE says 18 May
Pro Schneider Electric’s APC NetShelter SX uses colour to reduce errors Reducing installation and configuration errors with brighter aesthetics and better low-light visibility 18 May
Pro Dell gets active in endpoint protection Dell Data Protection | Threat Defense provides enterprise security for those without the 18 May
Pro Data exhaust – what you need to know Pay close attention or your data lake may turn into a data swamp 17 May
Pro Security researchers crack new CryptXXX version Updated tools can help recover affected files 17 May
Pro Google’s machine learning gains natural language understanding Open source SyntaxNet framework and Parsey McParseface parser allow researchers to train NLU models and analyse English text 17 May
Longform Is hybrid just today’s IT? Amid a sea of cloud terminology, has IT finally come up with one that’s fit for purpose? Asks LESLIE FAUGHNAN 16 May
Pro ICS News and events: May 2016 Business analysts funding, Finnish IT pros and the IASA conference 16 May
Pro Test, test and assess, says Calum Mackenzie of Integrity360 While perimeter security is still important, there are other considerations equally as worthy of attention 16 May
Pro Ward Solutions’ ISO 27001 accreditation service A first in certification services for Ireland 16 May
Longform Business analytics: cases for success The big guys get it and the smaller ones are coming round, but expectations needed to be managed according to the experts, writes ALEX MEEHAN 16 May
Longform CIO Folder: Choices, choices, decisions, decisions… You pay your money and takes your chances, or at least you used to 16 May
Longform Inside Track: Mobility management, moving targets With a rapid pace of change expected in mobile technologies, and hugely differing generational expectations, mobility management is a multifaceted... 16 May
Pro Hands on: HP Elitebook Folio 1020 G1 Bang and Olufsen A tight package gets a sweet sounding treatment 16 May
Pro Secure anonymised communications with Dispel A new approach to secure communications leveraging the unique capabilities of the cloud 16 May
Pro Site Reliability Engineering: how Google runs production systems Lifting the lid on the practice and discipline underpinning web-scale architectures 16 May
Subscribers 0
Fans 0
Followers 0
Followers