Archive

TECH TREK

Google’s Schmidt Touches Down in North Korea

Flanked by former New Mexico Gov. Bill Richardson, Google chairman Eric Schmidt arrived Monday in North Korea. Richardson, who also is a former UN ambassador, has characterized the trip as a "private humanitarian mission" -- a far more hospitable description than ones coming from the U.S. State Depa...

OPINION

The Channel Steps Up to the Cloud

I've been suggesting for the past few years that a more robust channel ecosystem must emerge for the cloud movement to continue to grow at its current pace. While fundamental nature of the cloud computing business creates significant challenges for traditional channel companies, rapidly rising use...

TECH TREK

Incendiary Video Spotlights Murky YouTube Policies

YouTube was the topic of much discussion Wednesday as it grappled with whether or not to take down the video widely linked to the violence in northern Africa that killed four Americans, including the U.S. ambassador to Libya, Christopher Stevens. The video was still accessible on YouTube as of late ...

Flame Malware Ignites Gauss in Lebanon

The fallout from the Flame malware that was identified in May continues. Ongoing research into the malware has led antivirus vendor Kaspersky Lab to discover a new malware platform, which it has named "Gauss." This platform has several similarities to Flame, Kaspersky said. "There's no doubt Gauss c...

SPOTLIGHT ON SECURITY

Siemens Patch Aims to Thwart Stuxnet Offspring

Siemens, which made the industrial controllers targeted by the Stuxnet cyberweapon, announced last week that it was releasing some patches aimed at foiling attacks on its hardware similar to those mounted by the now-famous worm. Previous versions of the controllers used in SCADA systems allowed DLL ...

Iran Promises Knuckle Sandwich if US Cyberattacks Persist

Iran has reportedly threatened the United States with a "teeth-breaking" response if cyberattacks against it continue. Last month, Iran claimed to have discovered and foiled plans by the U.S., Israel and the UK to launch what it claimed was a massive cyberstrike against its nuclear facilities. Furth...

ENTERPRISE SOFTWARE REPORT

CRM Conference to Showcase the Retail Experience

CRM Conference is being held May 29 to 31 at the Chicago Hyatt Regency. This annual event offers a unique agenda for retailers, said Devon Wylie, CEO of CRMC. "It's specifically focused on case studies from topnotch multinational retailers. With this approach, attendees can get actionable learnings ...

INSIGHTS

Sustainable CRM

There was an interesting article about airlines in The New York Times last week, "When Flying 720 Miles Takes 12 Hours," but the subtext was all about CRM, or at least where CRM has to go. If you know me at all, you know I closely attend to macroeconomics and energy issues, and they are all over th...

Stuxnet Sibling Duqu Slinks Into Industrial Systems

Malware that appears to be similar to the highly toxic Stuxnet worm was made public Tuesday by security firm Symantec. Duqu, named for the "~DQ" file names it creates, appears to work as a remote access data-collecting program that uses some of the same infecting techniques as Stuxnet, the malware d...

SPOTLIGHT ON SECURITY

The Pentagon, Contractors and Hackers: Who Protects the Protectors?

The United States Department of Defense is reportedly extending its Defense Industrial Base Cyber Pilot program, first announced by deputy defense secretary William Lynn in June, to defense contractors. Under this program, the DoD, together with the U.S. Department of Homeland Security, will share c...

OPINION

Tablet Makers Aren’t Reaching for the Brass Ring

The PC is not yet in danger of becoming extinct, but its position as the primary computing device in most people's lives could soon be threatened by the tablet. Several analyst firms have recalculated their 2011 PC sales projections after noticing a trend in which more consumers are passing on PC p...

LINUX PICKS AND PANS

FBReader Has Encyclopedic Knowledge of E-Book Formats

The concept of reading literature -- except for technical documentation -- on a computer screen has come a long way in the last few years. No doubt the growing popularity of EBRs, or electronic-book readers such as the Amazon Kindle and the Barnes & Noble Nook are having a big impact on our read...

Embedded Passwords: Dangerous by Default

The security community was horrified when it learned about Stuxnet, the worm designed to eat into industrial control systems, or SCADA systems, that was purportedly targeted at Iran's Bushehr nuclear reactor. Not only was the worm highly sophisticated, but it also targeted a SCADA system from Siemen...

CERN Battling Severe Case of Data Indigestion

Tony Cass, the leader of the European Organization for Nuclear Research's database services group, outlined some of the challenges the organization's computer system faces during his keynote speech Wednesday at LISA, the 24th Large Installation System Administration Conference, being held in San Jos...

EXPERT ADVICE

Monetizing Mobile Traffic Takes Mobile Data Intelligence

Mobile operators are facing a revenue dilemma these days. The numbers may vary according to which research you read, but the conclusion is the same: Data revenues are not even close to meeting escalating usage patterns. By way of example, AT&T estimates that mobile data traffic grew 50-fold betw...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

LinuxInsider Channels