Intel discontinues Arduino 101 development board and Curie module

Evolving Application Performance Management (APM) to Digital Experience Monitoring (DEM)


Application Performance Management (APM) tools have traditionally provided organizations with key performance metrics, including the speed, reliability, and capacity utilization of datacenter systems. But without clear visibility into the actual experience of users, these metrics mean very little. Just because your servers measure as 100 percent available, doesn’t mean users in all geographies are having a fast, reliable experience.
That’s because there are many other performance-impacting elements standing between your datacenter and your users. If an IT organization can’t effectively monitor the true user experience -- including customers, employees, partners, and suppliers -- it is impossible to know if their applications are delivering sufficient performance. The damaging results include frustrated customers which can lead to churn, decreased revenue and market share, and diminished brand perception.
Challenges faced in cloud technology adoption


The move to the cloud is something that has been high on the business agenda in recent years, but the complexity involved in moving has created significant stumbling blocks for organizations.
According to the CIF, 63 percent of businesses aim to move their entire IT infrastructure into the cloud eventually. Whilst RightScale says 95 percent of businesses use the cloud in some capacity, it’s proving difficult for organizations to move all of their applications and data into the cloud. In fact, Fuze revealed that only 10 percent of UK companies have moved entirely off site.
IBM shuts down Bluemix Object Storage v1, so migrate your data now!


There are a number of benefits to how quickly cloud technology has progressed, but now one of IBM's cloud products that launched in 2015 will soon become obsolete.
The company's Bluemix's Object Storage v1 which launched in December 2015 will be switched off in August 2017 after receiving two updates in total.
Ransomware victims paid over $25 million to recover files


Ransomware victims have paid more than $25 million in the past two years to get their data back, a new study by Google has shown.
The report, made by researchers at Google, Chainalysis, UC San Diego, and the NYU Tandon School of Engineering, followed the trail of cryptomoney through the blockchain, allowing researchers to get a birds-eye view of the ransomware world.
Ledger X is the first regulated cryptocurrency exchange in the US


In just a few months, digital currency investors and miners will be able hedge their investments under US regulatory oversight.
The cryptocurrency trading platform operator, Ledger X has been been granted registration by the US Commodity Futures Trading Commission to become the first federally regulated digital currency options exchange and clearing house in the US.
Alphabet Q2 2017 by the numbers: $26 bn revenue, $3.5 bn profit


There are four key areas where digital businesses can make a significant profit, and Google's parent company Alphabet appears to be gaining in all four of them according to its latest earnings report.
In a recent call to reveal its results, Alphabet said revenue rose 21 percent to $26 billion, in the second quarter of 2017. Net income was $3.5 billion.
Fruitfly malware starts infecting Macs


A new version of the Mac malware dubbed Fruitfly has been spotted in the wild, and it’s unclear if the latest macOS is vulnerable to it or not.
This is according to former NSA hacker and chief security researcher at Synack, Patrick Wardle. He told ZDNet that the malware, which was first revealed back in January, can take full control of an infected machine, including files, camera, screen, and peripherals.
Why modern cyber attacks require a multi-step plan


The world is once again reeling from a massive ransomware attack that either severely impacted companies’ operations or caused them to take a closer look at their ability to identify, contain and remediate these incidents. As attacks on enterprise networks grow more common and complex, incident response (IR) teams and security operations centers (SOCs) grow increasingly besieged: 44 percent of security operations managers see more than 5,000 alerts every day, according to the Cisco 2017 Annual Cybersecurity Report. Due to the staggering volume, organizations only investigate 56 percent of these alerts, and remediate less than one-half of the actual threats they receive.
Clearly, cybersecurity managers and staffers are overwhelmed. That’s why they must work with their leadership to come up with a multi-step process to effectively monitor, identify and eliminate threats. With this in mind, we’ve developed what we call an "IR Hierarchy of Needs" to empower SOC and IR teams:
Many businesses believe they're GDPR-compliant: The reality says otherwise


A new study has claimed that, contrary to what they may think, many businesses are struggling to be ready for GDPR.
According to The Veritas 2017 GDPR Report, a third (31 percent) of respondents believe their enterprise is in line with the regulation’s key requirements. On the other hand, when they were asked about specific GDPR provisions, their answers have shown that they’re most likely not compliant.
Wix Code helps businesses create a website


Businesses looking to establish themselves online now have an easier way to set up a website thanks to Wix.
The web development specialists have today launched Wix Code, a new platform that makes building a fully-fledged online site more straightforward than ever before.
ConeXware releases PowerArchiver 2017


Despite the rise of fast broadband and various social sharing cloud services, it’s always wise to archive your files for distribution. Indeed, in many cases you never know who is going to download your shared files, so you want to pack them up in the smallest possible archive so the downloader can obtain them as quickly as possible.
An archive management tool is one of our go to applications, especially when working with files each and every day.
Intel: Qualcomm uses the courts to destroy its competition


Intel has weighed in on the legal sparring between Apple and Qualcomm, accusing the latter of (ab)using the courts to destroy any competition it has.
The American chipmaking company accused Qualcomm of competition squashing on Thursday, issuing a public statement to the US International Trade Commission.
CEOs should be held accountable for cyber attacks and data breaches


CEOs should be the ones responsible in case of a cyber-attack and a data breach in an organization, according to a new report by Tripwire.
Polling Infosecurity Europe 2017 attendees on who should be held accountable in such a scenario, 40 percent said CEOs. CISOs are the second in line with 21 percent of answers, while 14 percent would blame the CIO.
Productivity trumps security


An overwhelming majority of workers are putting the security of their entire business at risk by preferring productivity over safety, new research has claimed.
A survey by security firm Bromium found that most security professionals are often asked to make exceptions to their work that would put companies at risk.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.