Computerworld has an article on how Amazon and Google scale up their massive IT infrastructure. What interests me are the tips from top-notch engineers that run contrary to conventional enterprise approach to their computing infrastructure.
A new worm is on the loose, and it is targeting computers running on Linux and PHP. While only machines based on Intel are targeted at the moment, the nature of the malware means that it could be easily modified to pose a threat to devices such as home routers and set-top boxes that use other processor architectures, too.
You must know about cloud storage provider Nirvanix abruptly announcing that it was closing shop, leaving customers with just weeks to find a new provider and move their data off its cloud storage service. Ultimately, it is evident that while the cloud offers many advantages, it can fail, too.
There is an increasing trend for malware authors to surreptitiously incorporate the ability to mine more of the virtual currency into their malware, likely fueled by an incredible price that has topped US$1,200 per Bitcoin at one stage.
Some cloud vendors have attributed Symantec's impending closure of its Backup Exec.cloud service as evidence that the company does not understand the needs of businesses. Though this is debatable, it should be evident that businesses are no longer satisfied with a pure backup-to-the-clouds service.
The Doxie Flip is a portable flatbed scanner that you can actually take out of the house. It's ideal for bringing along on road trips or even for use on the couch.
Wiring up their TV is not an issue for IT professionals, just don't expect your typically employee to know what to do.
The NSA has infected more than 50,000 computer networks around the world with malware designed to steal sensitive information, reports Dutch paper NRC. Citing documents provided by NSA leaker Edward Snowden, the newspaper also furnished a screenshot in its report that shows the "Computer Network Exploitation" (CNE) initiative spanning five continents around the world.
LG Electronics admit that its smart televisions track what consumers are watching, and that an option to deactivate this tracking does not work.
Google is making good on its earlier promises to enhance support for Android tablets. As of last Friday, users logging onto the Google Play store will be able to tell from a glance whether an app is optimized for their tablet devices.
On the surface, the WD Black Dual Drive is a 2.5-inch storage drive equipped with a SATA interface; under the hood, it essentially offers two stand-alone drives in the form of a standard 9mm thick laptop storage drive.
A new $89 HP Android tablet looks set to go on sale this Friday in the United States. The HP Mesquite tablet has a 7-inch screen and will come with the Medfield Atom processor under the hood, according to Computerworld.
A new variant of the well-known Shiz remote access trojan has been tweaked to search for the existence of SAP client applications.
Microsoft plans to deliver Service Pack (SP) 1 for Office 2013, SharePoint 2013 and Exchange 2013 in the early part of 2014, or about 13 months after the debut of Office 2013 in January 2013.
Six more were arrested as part of an investigation into a sophisticated cyber bank heist that spanned more than 20 countries, and involved the theft of a staggering $45 million in a matter of hours.
Google upgraded its SSL certificates to new ones that use the stronger 2048-bit RSA keys. This comes in the wake of the company's announcement in May that it would be upgrading its 1024-bit Secure Socket Layer (SSL) certificates to more robust 2048-bit certificates before the end of 2013.
The TYLT Energi Sliding Power Case for the iPhone 5/5S is a slim-line case that fits right into a custom battery pack that comes as part of the package.
We posed questions to Jay Botelho, director of product management at WildPackets, a well-regarded provider of various network monitoring equipment and application performance monitoring solutions. As a bonus, Botelho also gave us his take on why Apple decided not to include 802.11ac in the new iPad Air--whether you should roll out 802.11ac Wi-Fi today.
If the doomsayers are to be believed, we are heading towards a massive digital Pearl Harbor where devices ill-equipped or designed with inadequate security are broken into and personal information stolen.
With over 50 percent of server workloads running in virtual machines today, it is inevitable that traditional server administration tactics may need some tweaking to maintain their relevance.