Research overseen by the National Toxicology Program found a slightly elevated risk of cancer in male rats exposed to CDMA and GSM signals from cellphones.By Thomas Claburn Editor at Large, Enterprise Mobility, 5/30/20160 comments | Read | Post a Comment
To be in the best position to defend against DDoS, companies need to protect against a range of exploitable vulnerabilities -- and have the tools to detect and react to attacks.
By Vincent Berk CEO, FlowTraq, 5/30/20160 comments | Read | Post a Comment
GrabCAD Print takes the github concept of a processing and sharing hub which can deal with many different file formats, and applies it to the 3D printing process. The goal is to make prototyping faster and less convoluted.By Curtis Franklin Jr. Executive Editor, Technical Content, 5/30/20160 comments | Read | Post a Comment
Phil Horowitz, senior software engineer at Perforce Software, shares his experiences with pair programming. Proponents of the practice say it's a good way to improve code ownership, insure continuous code review, increase productivity, and reduce distractions. Here's what the Perforce crew found out after being locked in a room with coworkers for the better part of a year.By Phil Horowitz Senior Software Engineer, Perforce, 5/30/20160 comments | Read | Post a Comment
Telling a compelling story with your data helps you get your point across effectively. Here are four tips to keep your data from getting lost in translation.By Lisa Morgan Freelance Writer, 5/30/20160 comments | Read | Post a Comment
The right Raspberry Pi project can make the summer fun and educational. Here are nine possibilities that fit the bill. By Curtis Franklin Jr. Executive Editor, Technical Content, 5/30/20160 comments | Read | Post a Comment
Summer is a time to disconnect, but that doesn't mean you have to put all gadgets aside. Here are 10 gizmos to help you beat the heat and have fun.By Kelly Sheridan Associate Editor, InformationWeek, 5/29/20161 Comment | Read | Post a Comment
LinkedIn contributes Kafka Monitor to open source and Apple prepares to open Siri to third-party developers. We have all this, plus news about Confluent and Tinkerpop, in our Big Data Roundup for the week ending May 29, 2016. By Jessica Davis Senior Editor, Enterprise Apps, 5/29/20161 Comment | Read | Post a Comment
Oracle's long and contentious court battle with Google over Java copyright issues ends in defeat. But the open source community can breathe a sigh of relief -- for now.By Dawn Kawamoto Freelance Writer and Editor, 5/28/20161 Comment | Read | Post a Comment
Microsoft severed all remaining ties to Nokia, awarded funding to startups to improve global connectivity, and partnered with Facebook to build a cross-Atlantic cable.
By Kelly Sheridan Associate Editor, InformationWeek, 5/28/20160 comments | Read | Post a Comment
Measures come amid news that up to 12 banks may have fallen victim to attacks attempting to steal millions via the SWIFT network.By Jai Vijayan Freelance writer, 5/27/20161 Comment | Read | Post a Comment
Rather than build a brand new device to compete with the Amazon Echo, Apple is working to improve the capabilities of its Apple TV product, according to a new report. By Eric Zeman , 5/27/20162 comments | Read | Post a Comment
Intel, which recently announced that it would focus more on the Internet of Things and cloud computing, is acquiring Itseez, which specializes in IoT and self-driving vehicle technology.By Nathan Eddy Freelance Writer, 5/27/20162 comments | Read | Post a Comment
In the first of a two-part series, we examine the impact DDoS attacks have on business continuity Ė and why it is so much more than a network security problem. By Vincent Berk CEO, FlowTraq, 5/27/20162 comments | Read | Post a Comment
Hewlett Packard Enterprise's plan to spin off its IT Outsourcing and services group and merge that group with CSC will make the remaining HPE a leaner, more focused company. It's a strategy other tech giants have pursued as well. But what about the downsides?By Jessica Davis Senior Editor, Enterprise Apps, 5/27/20160 comments | Read | Post a Comment
Hottest crimes reported to IC3 last year include ransomware and email scams via business email compromise and all account compromise attacks. By Ericka Chickowski Contributing Writer, Dark Reading, 5/27/20160 comments | Read | Post a Comment
Microsoft and Facebook are joining forces to construct the "MAREA" undersea cable, which will deliver high-speed connectivity across the Atlantic.By Kelly Sheridan Associate Editor, InformationWeek, 5/27/20160 comments | Read | Post a Comment
Reversing a reversal of its initial victory, Google once again has prevailed against Oracle's claim that Android infringes its Java copyrights.By Thomas Claburn Editor at Large, Enterprise Mobility, 5/27/20162 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.