HPE and NASA sending a supercomputer to space


The computers the human race currently work with aren't built for space, and can't last long in off-planet environments. Astronauts aboard the ISS need new machines every month, as the old ones get destroyed by various factors that don't exist on Earth, like solar flares, radiation, subatomic particles, and irregular cooling.
Considering that SpaceX is currently preparing for a mission to Mars, it is paramount that the astronauts that eventually head out there have durable, working machines. Now, HP has announced it is working with NASA to create such a computer.
The benefits of intrusion prevention systems in security


There’s a penchant by many to measure the quality of IPS (Intrusion Prevention System) solutions by the number of threat signatures supported by the vendor. Checkpoint points to how it delivers "1,000s of signature, behavioral and preemptive protections." Fortinet claims its FortiGuard IPS service inspects "over 8,000 signatures consisting of 15,649 rules." Cisco IOS Inline IPS "supports more than 7000 signatures."
Presumably, the more signatures the more thorough the IPS. But is that really the right measure for today’s defending against today’s threat landscape?
The importance of proactive defense in enterprise security


The moment a cybercriminal targets an organization, the victim enters a race against time. Every minute that the attacker is able to operate undetected is more time for them to compromise systems, steal data, and cause more harm to their target. The ability to detect an attack and shut it down quickly can make the difference between a minor security incident and a huge breach that costs millions of pounds, or even brings an end to the company itself.
The good news is that organizations seem to be making great strides in detecting security breaches, according to our 2017 Trustwave Global Security Report, which examines the results of thousands of our investigations into security incidents. Across the incidents we investigated in 2016, the median time from intrusion to detection of a compromise had fallen to 49 days, down from 80.5 days in 2015.
Why you should be moving to the cloud


Whilst not a brand-new phenomenon, the cloud has dominated headlines in the technology sector in recent years, as more businesses migrate and harness the benefits associated with it.
Cloud computing involves businesses hosting data, applications and virtual machines (VMs) on servers in remote data centers, which are connected to devices and users through the internet or private networks.
Don't dismiss insider threats when assessing security


When we think of a cyberthreat, we often imagine a nation state hacking group, or a virus trying to work its way into our company network. After all the media is full of depictions of incidents of this very nature -- how many times has North Korea or Russia been blamed for hacking the West?
The funny thing is, the cyberthreat that we should be worrying about actually resides in a place that’s a lot closer home, often found within the company building. What I’m talking about is the insider threat. And it’s about time we paid closer attention to it.
Four tips to make bots successful at customer support


Bots are at a tipping point in customer care, and many large bands, including RBS and Vodafone, are already bringing AI and bots to life for millions of their customers. But the hype around bots has also introduced many misconceptions. If implemented poorly, bots could have a disastrous effect on the customer experience.
From our work with many of the world’s leading bot-makers and largest brands over the last few years, we have learned there are four "secrets" to making bots successful in customer care, without which bot projects are more likely fail.
The value of analytics and big data in digital transformation


Big data and analytics are topics firmly embedded in our business dialogue. The amount of data we’re now generating is astonishing. Cisco predicts that annual global IP traffic will reach 3.3 ZB per year by 2021 and that the number of devices connected to IP networks will be more than three times the global population by 2021, while Gartner predicts $2.5M per minute in IoT spending and 1M new IoT devices will be sold every hour by 2021. It’s testament to the speed with which digital connectivity is changing the lives of people all over the world.
Data has also evolved dramatically in recent years, in type, volume, and velocity -- with its rapid evolution attributed to the widespread digitization of business processes globally. Data has become the new business currency and its further rapid increase will be key to the transformation and growth of enterprises globally, and the advancement of employees, "the digital natives."
Containers have long-term value in the enterprise


In an era where the preferred application platform is the cloud and DevOps is set to drive performance in today’s digital economy, industry skeptics still view containers as "over-hyped," with no long-term value in the enterprise.
However, with large investments from Amazon, Google and Microsoft, the option of containers is becoming a viable solution -- and over the next three years, predictions are that it’s set to see a huge rise in its implementation.
How the connected world is testing the testers


With the emergence of IoT, everything becomes connected; there is a continuous blurring between real world and digital world where everything is moving to become predominantly digital. Apps are location-aware, context-aware, and aware of everything around them (supply chain, logistics network) and that’s bringing the custom device world into mainstream industry-wide. Bring together any device (custom or mainstream, mobile or fixed) and everything is connected and focused on the experience of the end user.
In this new world, mobile apps are being rolled out continuously and at a far greater speed. Change is fast, and customer expectation sky high. Add to that we are living in a diverse and fragmented technology world across different platforms and devices with increasing adoption of AI and machine learning, with security as an ongoing and ever-increasing challenge.
Manufacturers are cybercriminals' biggest target


Cyber-attacks all over the world are becoming increasingly sophisticated, according to a new report by the NTT Group company. According to the same report, these attacks are also growing in frequency.
The Global Threat Intelligence Center (GTIC) 2017 Q2 Threat Intelligence Report says cyber-attacks were up by 24 percent globally, in the second quarter of 2017.
Giveaway: Get Auslogics File Recovery 7 ($29.95 value) FREE for a limited time


You give your computer a spring clean by removing a ton of files you’ve stored for years. Then you realize a few weeks later that you accidentally deleted important documents or old photos and there’s no quick and obvious way of retrieving them.
The solution is a dedicated file recovery application. There are few better than Auslogics File Recovery 7 and we’re offering you the full version, worth $29.95, across this weekend. It’s always worth having a file recovery program within your suite of system tools.
Refurbishing servers: 5 great reasons why you need to consider it


If you work in IT solutions as a provider for managed services, cloud services, or internet services you are going to need servers that meet your needs in terms of both price and performance. So how can you keep your costs down and find the solutions that your clients and customers are looking for?
When it’s time to replace your servers, buying refurbished is the obvious solution. Hard on the heels of that thought though is a common fear of zombies -- getting stuck with zombie servers to be more specific. These comatose entities will suck not only your wallet but also your operating budget dry while providing zero value.
The benefits of intelligent DNS in DevOps projects


The DevOps model continues to gain traction because it’s an efficient and cost-effective development approach. It yields fewer errors, shorter development cycles and reduced need for expensive code fixes after deployment. One goal of DevOps is continuous development and deployment, which necessitates the automatic creation or removal of networks, as well as automated deployment to production.
Automation is important because the fewer the number of manual steps involved, the less likely that human error will disrupt the process. Intelligent DNS improves DevOps project lifecycles by integrating with your software development and automation tools. Let’s take a look at intelligent DNS and the advantages and upgrades it offers to the DevOps project lifecycle.
Security challenges slow down innovation in the financial sector


Organizations in the financial services sector are forced to innovate in order to stay relevant. At the same time, innovation is being slowed down by the need to keep data and applications safe, putting organizations in this vertical in quite a tough spot.
This conclusion was given out in a new report by Claranet. The report says that striking the right balance between innovation and security is becoming a "key competitive differentiator" in the sector.
Uber adds app messaging between driver and rider


If you’re anything like us, you land after a long plane journey, slightly shattered and attempting to adjust to your new time zone then once you’ve finally left passport control and picked up your bags, you simply want to grab a taxi and get to your hotel as quickly as possible.
To achieve this, many of course choose to book an Uber. When the process works smoothly, everything is fine. But, sadly, Uber drivers aren’t always offered the same privileges as regular taxis, so you have to somehow navigate your way to a pickup location. To do this, a phone call from the driver is often required.
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.