OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
Skype Begins Dismantling the Language Barrier
December 16, 2014
Microsoft on Monday announced the first phase of its Skype Translator preview program, which initially will facilitate conversations between English and Spanish speakers. It will convert spoken words both ways. It also will translate instant messages in 40 languages. Translations occur in near-real time. Participants must run Windows 8.1 or Windows 10 Technical Preview on a desktop or tablet.
Sony May Have Succumbed to DDoS Temptation
December 15, 2014
Sony reportedly has used Amazon Web Services to launch distributed denial of service attacks on sites carrying files stolen from its network. Those attacks apparently involved "hundreds of computers" in Tokyo and Singapore. Amazon reportedly issued a statement denying the claim, but the language it used was vague: "The activity being reported is not currently happening on AWS."
Berners-Lee Sounds Clarion Call for Universal Web Access
December 15, 2014
The Internet should be a basic human right, but access to it is increasingly unequal around the globe, said World Wide Web inventor Tim Berners-Lee last week. The Web has the potential to be a great equalizer, he asserted, but only "if we hard-wire the rights to privacy, freedom of expression, affordable access and Net neutrality into the rules of the game."
Have Intel and Microsoft Discovered the Fountain of Corporate Youth?
December 15, 2014
This has been an interesting quarter. After Andy Grove left, Intel often seemed to struggle with its place in the world and seemed at odds with the computing OEMs. Now, though, it seems more and more like it did when it was 20 years younger. It's not alone, either. Microsoft, which seemed to have forgotten why there were OEMs, suddenly is acting much more like the firm we knew in the early 90s.
Iowa to Lead Digital Driver's License Movement
December 12, 2014
Iowa plans to issue digital drivers' licenses in the form of a smartphone app by next year, Paul Trombino, director of the Iowa Department of Transportation, said earlier this week at a public state agency budget hearing. The digital license will be accepted by Iowa law enforcement officers conducting traffic stops, as well as by security officers who screen travelers at Iowa's airports.
Whoa, Maybe Apple Really Is Serious About Enterprise IT
December 12, 2014
Apple and IBM have delivered the first batch of enterprise-class apps for iOS, rolling out 10 apps that cover key industry verticals like banking and finance, travel and transportation, retail, insurance, telco and government. The companies have pledged to deliver more than 100 such apps. The apps are the first proof point in the "unprecedented" partnership.
2015: The IoT, Big Data and Cloud Come Together
December 12, 2014
Since December 'tis the season when industry prognosticators provide their predictions for the year to come, I'll offer my ideas about how three major tech forces -- cloud computing, big data the Internet of Things -- will converge in 2015, and four ways organizations can capitalize on this convergence. The various ways in which they will interact truly will be transformational.
NSA's Auroragold Mining Operation
December 10, 2014
The United States National Security Agency, which is known for monitoring landline, Web and cellphone communications worldwide, reportedly also targets wireless carriers. Documents released by whistle-blower Edward Snowden show the NSA has monitored more than 1,200 email accounts associated with major cellphone network operators worldwide since 2010.
No One Has Privacy Now, Thanks to Super Cookies
December 10, 2014
Does anyone really think that we have any privacy? Probably not. Between GPS tracking and our favorite app, most of us gave up on privacy long ago. Some privacy advocates claim that cell carriers have not been transparent about what personal data they have been gathering and using, although we now know that in order to use a cellular device, we must agree to give it away.
Turla Trojan Unearthed on Linux
December 09, 2014
Turla, a Trojan that has infected hundreds of 32- and 64-bit Windows computers at government institutions, embassies, military installations, educational institutions, and research and pharmaceutical companies over the years, has been found on Linux systems, Kaspersky Lab reported. The company has discovered two variants of the malware running on Linux.
Federal IT Contract Forecast: Mostly Foggy
December 09, 2014
Federal agencies will be keeping a sharp eye on how much they spend on information technology over the next several years, as budgets will remain tight. In order to deal effectively with tighter budgets, IT providers to the government will have to understand the complex contracting procedures federal agencies will use to maintain discipline in spending.
HP's New EliteBooks Target Enterprise Sweet Spot
December 03, 2014
HP says its new EliteBook Folio 1020 family of business-oriented PCs are the thinnest and lightest in the industry. The HP EliteBook 1020 and the ultra-lightweight HP EliteBook 1020 Special Edition both offer an ultrathin form factor measuring just 15.7mm, and they are designed with enterprise mobility in mind. They are designed to pass military-grade testing for drops, shocks and exposure.
Selling a Non-Product: The Multifaceted OpenStack
December 02, 2014
Is OpenStack best deployed as a server distribution, a service from a cloud provider, or something else? At the OpenStack Summit in Paris last month, seven developers participating in a panel discussion failed to reach a consensus. One reason for the debate over deployment methodology is the lack of any clear product designation. OpenStack is more an entity than a product.
Did North Korea Get the Last Laugh Against Sony?
December 02, 2014
Upwards of 1.2 million people reportedly have used pirate sites to download Brad Pitt's unreleased World War II drama Fury. That was one of five films hackers leaked onto the Web following an attack on Sony Pictures' network last week. Sony has called in the FBI and other law enforcement agencies. It's rumored that the hack was launched by North Korea.
The Madness of the ITC, Part 2: Is Its Reach Exceeding Its Grasp?
December 02, 2014
The U.S. Trade International Trade Commission has broad investigative powers on matters of trade, gathering and analyzing trade data, and providing it to the White House and Congress to help formulate U.S. international trade policies. Its statutory authority is based on legislation that is 20 or more years old, and consequently does not address issues in the digital age.
'The Practice of Cloud System Administration' Brings Network Management Down to Earth
November 25, 2014
The Practice of Cloud System Administration, Volume 2 is a look into IT gone bad in some companies, and how doing it right can salvage enterprise use of cloud computing. The authors make 11 statements about computers and their networks on the first page of the book's preface. They ask which statements are true. You most likely will get numerous wrong answers.
'Elegant' Regin Malware Linked to Brits, NSA
November 25, 2014
A sophisticated malware program called "Regin" has been used in systematic spying campaigns against a range of international targets since at least 2008, Symantec reported. Regin is a backdoor-type Trojan with a structure that displays a degree of technical competence rarely seen in malware. "It's a beautiful piece of architecture," said Scott Borg, CEO of the U.S. Cyber Consequences Unit.
FCC's Spectrum Cash Cow Produces Rich Milk
November 25, 2014
Bidding for wireless spectrum in the United States Federal Communications Commission's latest auction has gone through the roof, raising more than $36 billion as of Tuesday morning. A total of 70 qualified bidders are seeking 1,614 licenses in the 1695-1710 Mhz, 1755-1780 Mhz and 2155-2180 MHz bands. The auction almost certainly will raise even more money over the next few weeks.
The Intangibles: 5 Things That Aren't on the CRM Data Sheets
November 21, 2014
CRM has been around for a long time now -- more than 25 years. Amazingly, many businesses, including large businesses with revenue in excess of US$100 million, still operate without it. That's amazing, because to many business leaders, CRM has become table stakes when it comes to creating a software infrastructure. Within CRM, many of the features have become table stakes, too.
Platform Native
November 19, 2014
The idea of an omnipotent software platform and the evolution of customer science go hand in hand. Customer science is the upshot of my idea that we're in the process of converting from random acts of CRM in the front office to a more structured, efficient and predictable approach to conducting front-office business. Platforms make customer science possible.
Vendors Sow Seeds for Next Big Federal IT Thing: Convergence
November 19, 2014
Information technology vendors have spotted the next big thing for serving the U.S. government market. The only questions are 1) whether federal agencies themselves have seen the same thing; and 2) if so, whether they are prepared to jump into yet another new procurement process. What the vendors have in mind is akin to the turnkey process used in the construction industry.
WhatsApp Battens Down the Hatches
November 19, 2014
WhatsApp has added end-to-end encryption and enabled it by default in the latest version of its Android messaging application, partner Open Whisper Systems announced Tuesday. The new feature taps Open Whisper's open source TextSecure encryption protocol to ensure that only a conversation's participants can read the messages they exchange. WhatsApp itself won't be able to decrypt the messages.
IBM Begins New Email Chapter With Intelligent Verse
November 19, 2014
IBM on Tuesday introduced Verse, its entry into the reinventing email derby. Verse, which will be available in both an enterprise and freemium edition, integrates the many ways people communicate with each other every day -- email, meetings, calendars, file sharing, instant messaging, social media, video chats and more -- into a single collaboration environment.
China Suspected in Attacks on USPS, NOAA
November 19, 2014
The U.S. Postal Service and National Oceanic and Atmospheric Administration last week confirmed that their computer systems were targeted in months-long cyberattacks that appear to have originated in China. The attack on USPS compromised information of an estimated 800,000 employees. Data at risk includes names, date of birth, Social Security numbers, addresses and dates of employment.

See More Articles in Enterprise IT Section >>
Facebook Twitter LinkedIn Google+ RSS