Archive

Amazon Pharmacy Opens for Business

Amazon is getting into the online pharmacy prescription business in a big way. The e-commerce giant is setting up a new drugstore on its platform, Amazon Pharmacy, that will allow customers to complete a pharmacy transaction on their desktop or through the company's mobile app. Amazon said that fill...

Whom Can We Trust to Safeguard Healthcare Data?

Healthcare records were digitized to help prevent medical errors such as misdiagnoses and mistakes with medication, but electronic health records have made it easier for bad actors to steal patients' highly personal information. Cybercriminals are further motivated by the fact that patient medical r...

Open Source Processes Driving Software-Defined Everything

Some of the world's largest, most regulated, complex and centuries-old industries have several essential things in common with today's rapid development, bleeding-edge innovation. They are all dependent on open source software, and they are building open source into the fabric of their R&D model...

Controversial Plan Urges DoD to Recruit Tech Pros to WFH

The United States Defense Innovation Board has recommended that the Pentagon hire civilians to work from home who can handle classified information as a way of attracting people with technology expertise. The individuals sought "will have technical degrees and/or highly specialized skills in digital...

EXPERT ADVICE

Cybersecurity Assessment and the Zero Trust Model

Instead of legacy security models that differentiate a "trusted" interior from an untrusted external one, zero trust instead assumes that all networks and hosts are equally untrustworthy. Once this fundamental shift in assumptions is made, you start to make different decisions about what, who, and w...

Cybersecurity Conundrum: Who’s Responsible for Securing IoT Networks?

Surely spurred by the work-from-home necessities of 2020, people have connected a multitude of non-business devices to their corporate networks, making it progressively difficult to implement cybersecurity because every device is a potential weak point. So, who will ultimately be responsible for cyb...

FAA Clears Amazon for Drone Delivery

Amazon has cleared a key government hurdle in its flight path to deliver packages by airborne drones. The U.S. Federal Aviation Administration has granted the online retail giant a Part 135 certificate, which allows Amazon Prime Air to operate as an air carrier. The move lets Amazon make commercial ...

Software Piracy Spreading With the Virus

Software piracy involves much more than businesses and consumers using illegal copies of computer programs. What lurks within the pirated copies is often rogue code -- malware -- that can be just as deadly to computers and users' finances. Software companies are reporting that piracy has increased 2...

ANALYSIS

ROI on Salesforce

Deep in its DNA, Salesforce has always focused on a bigger picture. Its commitment to community issues is best expressed in the company's philanthropic orientation. At the same time, Salesforce has always had the customer at the heart of what it does -- and that transcends its customer relationships...

5 Cloud Computing Trends in 2020 and Beyond

Cloud technology has matured substantially during the past 15 years, and now a paradigm shift is taking place, away from legacy in-house IT business services, to a cloud-first technology-driven agile workplace. Here are five trends in cloud computing for organizations to consider when plotting an IT...

Health and Fitness App Exercises AI for Competitive Advantage

In-person workout sessions these days might seem like a thing of the past, while solitary workouts at home replace gym visits as an ongoing result of the pandemic. The use of artificial intelligence is not yet a common feature in fitness apps, but it is a main component in a popular India-based app ...

New Security Hole Puts Windows and Linux Users at Risk

If you are a Windows or Linux user, brace yourself for a long siege of vulnerability nightmares. The fix will be long and treacherous and could brick your computers. Eclypsium researchers have detailed a set of newly discovered vulnerabilities dubbed "BootHole" that opens up billions of Windows and ...

Samsung Reveals 6G Vision

Although many people haven't wrapped their minds around 5G mobile technology yet, Samsung has already started talking about 6G. In a report released Tuesday, the company reveals its 6G vision of the future, including technical and societal megatrends, new services, requirements, candidate technologi...

Tech’s Role in the Future of Health and Public Safety

Digital technologies can help shift health and public safety agencies from a "detect and respond" approach to a "predict and prevent" stratagem. They can also set the stage for a more connected and data-led approach through robust cybersecurity architectures, efficient remote workforces, and secure ...

To earn your loyalty as a consumer, how important is it that a brand provides a personalized experience?
Loading ... Loading ...

LinuxInsider Channels