Welcome Guest | Sign In
LinuxInsider.com
NSA Deploys Botnet Armies, Spoofs Facebook
March 13, 2014
The latest revelations about NSA surveillance indicate the agency could infect millons of computers with malware, and has spoofed Facebook servers to capture traffic from targets. "It is not surprising that the NSA would create and deploy malware," said CDT's Harley Geiger. "What is surprising is the evidence the NSA is prepared to do so on a scale that could affect millions of computers."
Berners-Lee Dreams Impossible Dream
March 13, 2014
Tim Berners-Lee, known as the "father of the Internet," has called for an online bill of rights. Twenty-five years ago, Berners-Lee wrote a proposal for what would become the Internet as we know it today, making the case that it needed to move toward a decentralized, open architecture and away from the proprietary linear structure that was emerging at the time.
Feds, IT Vendors See Clearer Path to the Cloud
March 13, 2014
Federal agencies have been diligently pursuing the use of cloud-based information technology for the past three years in compliance with a White House directive. As a result, federal spending on cloud-based technologies reached $2.3 billion in fiscal 2013, according to a market assessment by Deltek. That investment level could top $6 billion annually in a few years.
Feinstein Accuses Spooks of Spying on Senate
March 12, 2014
A powerful U.S. senator has accused the CIA of spying on a network drive legislative staffers used to prepare a report on abuses -- including torture -- in the agency's detention and interrogation program. The search may have violated the separation of powers clause of the U.S. Constitution, Senate Intelligence Committee Chairman Diane Feinstein, D-Calif., told the Senate on Tuesday.
How to Encrypt a Windows 8 PC Drive
March 12, 2014
Real-life events -- the disclosures from website WikiLeaks; Edward Snowden's leaks of classified government documents to media outlets; credit card hijacks by the server load; and even Facebook's stumbles over its privacy policy explanation to the masses -- have created a general sense of unease when it comes to privacy these days, even at the consumer level.
Lenovo: IBM Strike's Not Our Problem
March 11, 2014
Chinese PC maker Lenovo is washing its hands of a wildcat strike at an IBM factory in Shenzhen, China. In January, Lenovo purchased one of IBM's server businesses, and the striking workers -- more than 1,000 of them -- are among those who will be absorbed by Lenovo. The $2.3 billion deal is not yet final, and Lenovo doesn't want to get stuck with any of IBM's headaches until the ink is dry.
Google Doles Out Cash for Apps Referrals
March 11, 2014
Google has launched a referral program for its office apps. It will hand out $15 bonuses to Google Apps customers who convince new users to sign up for the service, which includes Gmail for businesses, Google Calendar, Docs, Slides, Hangouts and Google Drive. Google will award the $15 bonus for up to 100 new user referrals, with each user in a domain counting as a referral.
Salesfusion Bumps Up Lead Scoring in New Marketing Automation Release
March 10, 2014
Salesfusion has released a new version of its marketing automation platform enhanced with the lead-scoring capabilities it acquired with its purchase of LoopFuse. The end result of this newly integrated product is a marketing automation application that has predictive lead scoring and is priced and configured to be used by mid-market companies, said Salesfusion CEO Christian Nahas.
Turkey PM, Prez Go Round and Round About Social Media
March 10, 2014
Turkey's prime minister and president are spewing conflicting talking points on the nation's stance toward social media. It turns out the one who's getting nailed on social media is the one who wants more restrictions. Prime Minister Recep Tayyip Erdogan last week vowed to restrict social media after this month's local elections, but President Abdullah Gul said that was "out of the question."
The Increasing Business Risk of Cloud Cyberattacks
March 10, 2014
It is hard to figure out which is growing at a faster pace -- movement to the cloud or cybercrime. Cybercrime is following the data to the cloud, according to reports, to find and steal cloud data of hotel records, credit card information, and maybe even corporate secrets and the client files of lawyers. The concept of managing data for business on a remote computer is actually 50 years old.
The Amazing Promise of HP's Impossible Turnaround
March 10, 2014
HP has made incredible progress over the last few years with Meg Whitman at the helm, which was evident at its annual analyst meeting last week. It has made major progress in the cloud, in devices, and in how the company is run. The result should be an increasingly interesting set of products and services uniquely differentiated in the market. This effort was far from easy.
Fed Ruling May Bring Flocks of Buzzing Drones to US Skies
March 07, 2014
The use of commercial drones in U.S. airspace is essentially legal, at least for the time being. National Transportation Safety Board Judge Patrick Geraghty this week nixed the Federal Aviation Administration's attempt to levy a $10,000 against Raphael Pirker for using a remote-controlled glider to capture video footage for an ad.
Privacy Groups Bring WhatsApp Worries to FTC's Door
March 07, 2014
The consumer privacy backlash stirred up by Facebook's recent deal to purchase WhatsApp for $19 billion is now in full swing. The Electronic Privacy Information Center and the Center for Digital Democracy jointly filed a complaint about the deal with the FTC. Following the announcement of the agreement, both companies offered reassurances that WhatsApp user data would be safe from Facebook.
1,000 Strikers Protest 'Illegal' Offer, Hours at IBM Factory in China
March 07, 2014
Workers at a factory in China are on strike after rejecting compensation plans offered as a result of IBM's $2.3 billion deal to sell its low-end server business to Lenovo. More than 1,000 workers brought production to a halt Monday at IBM's International Systems Technology Company server-making factory in Shenzhen, Guangdong. The strike has continued throughout the week with no end in sight.
Russia Implicated in Ukrainian Cyberdisruptions
March 06, 2014
Security forces in Ukraine, where tensions are running exceedingly high after weeks-worth of turmoil, have accused the Russian army of tampering with its mobile communications. In addition, Ukrainian news websites and social media have been smeared with pro-Russia propaganda. In other words, an entirely new element appears to be in play: cyberconflict between Kiev and Moscow.
Sprint Softbank's Jockeying for the Inside Track
March 06, 2014
What is going on with Sprint Softbank? What will the company look like when it finally emerges from its cocoon? Who else will it merge with? Where will it be based? There has been quite a bit of transformational work going on. Sprint and Softbank won U.S. government approval after months of vigorous debate and got together last summer. It once seemed doubtful the merger would happen, yet it did.
Beijing to Officials: Please, No Smartphones During Session
March 05, 2014
Officials partaking in China's National People's Congress, which began Wednesday, have been asked to please not mess around on their mobile devices during the session. A state-owned newspaper published a list of rules for attendees, including this one: "Do not use your phones to send text messages or make phone calls during meeting; do not use your computer or phone to play games."
Federal Agencies Knee-Deep in Mobile Devices
March 05, 2014
U.S. government agencies are moving briskly into the mobile era, spurred by the fast pace of technological change. The scope of the federal mobile market is broad-based, and to some degree depends upon what is meant by such terms as "wireless," "mobility" and "digital." The parameters of that market are coming into focus, with federal agencies recently having created a track record of procurement.
Red Hat Launches a 3-fer for Enterprise BPM Users
March 04, 2014
Red Hat on Tuesday unveiled Red Hat JBoss BPM Suite 6, an open source business process management suite that combines business process management, business rules management and complex event processing technologies in a single product offering. JBoss BPM Suite 6 includes all the capabilities of the next version of Red Hat's business rules platform, JBoss BRMS 6.
Microsoft Beats the Customer-Centricity Drum at Convergence
March 04, 2014
Microsoft on Tuesday kicked off its Microsoft Dynamics Convergence 2014 conference with a keynote address by Executive Vice President Kirill Tatarinov, whose running theme was the need for the companies to be customer-centric to stay competitive. "Technology has changed the social fabric, transforming how we engage, connect and interact with one another," Tatarinov said.

See More Articles in Enterprise IT Section >>
Facebook Twitter LinkedIn Google+ RSS