White papers, case studies, technical articles, and blog posts relating to
Updated: 54 min 33 sec ago
Also known as private browsing or porn mode, your browser privacy setting has all sorts of useful applications that have nothing to do with hiding the consumption of adult content.
Apple and Samsung are part of group working on a standard to ensure Digital Key will be reliable and unhackable.
Tesla accuses former employee of hacking, stealing data, and leaking false information to the media.
Among the big elephant platform providers, Hortonworks remains just about the last one not shy of having Hadoop associated with its name. But after this week's DataWorks Summit, it's apparent that Hortonworks and data warehousing providers are aiming to play the same Switzerland of analytics in an increasingly cloud-centric world.
You'll need to wade through Cisco's advisories to work out if software you're running is vulnerable or already fixed.
Closing in on $100 million in funding, Bossa Nova is helping brick-and-mortar compete with Amazon
Amid recent political upheaval, Catalonia in northeastern Spain is bringing together its security initiatives.
Cloud computing can't fix everything but it can be a key element of business transformation if handled well.
Learning from previous cyber attacks, and understanding what is coming next is key to keeping your data safe.
Are you connected to your colleagues on social media? Should you be? To avoid uncomfortable encounters, perhaps you need to rethink the connection, according to a new study.
When it comes to cloud services and software-as-a-service (SaaS), we're all familiar with the usual players. But there's a huge world of opportunity and available resources beyond Google, Dropbox, Salesforce, Amazon, Microsoft and even beyond storage and server services.
Business users adored their hardware QWERTY BlackBerry keyboards, but most of the world has moved to on-screen keyboards over the last decade. The KEY2 provides the best physical keyboard, but that comes with some compromises.
Everybody knows that 12345 is a bad password. But what they're using instead isn't much stronger
Teradata said SAP built HANA using its intellectual property and now is trying to block out its customers from accessing their ERP data.
AMD did something that was long overdue -- it upended a stagnant and complacent server market, and all in a year.
The council-owned entity is looking to put its data to good use, embarking on a project with US-based Machine Zone to 'gamify' public transport.
Mendix Assist provides 90% accuracy on next-step suggestions while building out an enterprise app.