HPE will lose its CTO and COO by 2017

HPE logo sign

Hewlett Packard Enterprise (HPE) will be losing its CTO Martin Fink and its COO John Hinshaw at the end of 2016. Fink, who was the head of HP Labs, is set to retire after spending over 30 years at the company.

In a corporate blog post, Meg Whitman, the CEO of HPE wrote: "Martin has had a remarkable career, driving some of our most important initiatives including our cloud, open source and Linux strategies and leading the Business Critical Systems division".

Continue reading

IT pros training CEOs to spot phishing attacks

Phishing

Out of 300 IT professionals attending the Infosecurity Europe conference, almost half (49 percent) believe their CEO has fallen victim to a targeted phishing attack.

The results have been published in a new paper by unified security management and crowd-sourced threat intelligence company, AlienVault.

Continue reading

Public Wi-Fi is unsecure

Public wi-fi

People are aware of the risks that come with using Wi-Fi, but generally believe public hotspots, like those on airports, are secure. Those are the results published in Norton’s latest Wi-Fi Risk Report 2016, which said 64 percent of UK’s adults assume public Wi-Fi is safe enough to use.

However, Norton says this couldn’t be further from the truth.

Continue reading

Workers find meetings productive

Team meeting

You’ve probably heard it a million times, how meetings are actually a waste of time and do little good. You’ve also heard how people usually browse social media and look at the ceiling during these meetings, and that it would be more productive watching paint dry.

Turns out, this couldn’t be further from the truth. Unified communications solutions company ShoreTel conducted a research into what the current workforce thinks about meetings, and the overall opinion is vastly positive.

Continue reading

Apple pays just £12.9 million in UK taxes

apple_store_front

By booking sales through its international headquarters in Ireland, Apple was able to only pay £12.9 million in UK corporate tax during 2015. This is a nine percent increase from the previous year, in which it paid £11.8 million.

The European Commission has been investigating Apple’s tax arrangements in Ireland for two years now and the results of the probe are set to be released as early as next month. If the company’s tax arrangements are found to be unlawful, it could end up repaying billions to the Irish state.

Continue reading

Security researchers find major vulnerabilities in Uber

Uber Samsung Galaxy smartphone app

A group of hackers from a security company in Portugal managed to hack into Uber and get their hands on a bunch of data that should remain hidden.

The team of three experts, Vitor Oliveira, Fábio Pires and Filipe Reis from Integrity, found a total of six flaws: they managed to use promotion codes, found private emails using UUID, found users’ phone numbers, created driver accounts, validated them, found where you went, who your driver was, and who you are and, ultimately, date of the trip, driver name and picture, the ID and the cost of the trip. The route map was also disclosed.

Continue reading

Organizations must transition from legacy 'wet ink' signatures to a 'digital' format

Signature

Even in today’s highly digital, technology-driven business environment, many organizations demand wet ink signatures for important business critical documentation. This is when, say a contract in an electronic format for a new deal could be signed and sent via email within minutes -- compared to wet inking it, scanning (sometimes running into 100s of pages), and posting to the other party, who then would follow the same process to send a signed copy back.

It’s a hugely inefficient, time consuming and inconvenient process. But it’s a corporate policy that many businesses insist on.

Continue reading

IBM Summit will be the world's fastest supercomputer

IBM logo

After it was reported that China has the world’s fastest supercomputer, IBM unveiled a few details about its upcoming behemoth, which is already branded as the computer that will dethrone the Chinese Sunway TaihuLight.

IBM's supercomputer is called Summit. It is expected to reach US Department of Energy’s Oak Ridge National Laboratory in early 2018, and should have a quarter more computational power than originally intended.

Continue reading

Intel Security is up for sale

intel_logo_building

Intel is looking for a buyer for its Intel Security. Intel Security, previously called McAfee, was bought from the security firm McAfee back in 2011 for $7.7 billion (£5.75bn).

Intel rebranded the company as Intel Security, and aimed to implement its security features at chip level, giving cyber-security a whole new dimension. It seems, though, six years later, the plan had failed.

Continue reading

Crucial introduces NVDIMM persistent server memory

crucial nvdimm

There’s a new type of server memory which might speed up backup restore and recovery, as well as help with salvaging any data left unsaved during a power outage.

Memory and storage upgrade company Crucial has announced its Nonvolatile DIMM (NVDIMM) server memory. The company says this type of memory is a better choice for servers because it offers better read and write speeds than HDD or SSD disks, allowing for speedy backups and recoveries.

Continue reading

Choosing an enterprise mobility program -- it's about combining ease with benefits

Enterprise mobility

Technology is moving at warp speed, and any business who chooses to side-step the most-current innovations in that field is, quite literally, choosing to be left behind. Thousands of companies have successfully built their own apps through the use of an enterprise mobility platform.

Here, we will discuss what features to look for when choosing the best enterprise mobility platform for your business' particular needs.

Continue reading

Red Hat buys API management company 3scale

red hat logo sign headquarters

The open source software company Red Hat has just announced that it will acquire 3scale for its software which manages application programming interfaces (APIs).

The deal is not crucial to Red Hat though it does plan to "open source the code in the Red Hat way", according to a blog post from the vice president and general manager of middleware at the company, Mike Piech. The company also said that its GAAP operating expenses will increase by $7 million during the 2017 fiscal year.

Continue reading

Hybrid cloud security: What it is and best practices

Hybrid Cloud

A virtualized hybrid cloud infrastructure comes with the assurance of better business outcomes but the rapid transformation that accompanies cloud also leaves the infrastructure vulnerable to cyber attacks. This makes risk management critical for every enterprise. Since no two enterprises work exactly the same way, a standard risk tolerance profile cannot sustain the potential risks posed by technical hurdles.

Despite a cloud service provider’s best possible efforts, security issues are inevitable. With hybrid-cloud deployments you will also need to ensure that sensitive business data remains secure between private and public cloud. This is why hybrid cloud environment strategies need to take into account the possibility of regular movement of data between private and public clouds. Here are security issues to take into account when handling hybrid cloud security:

Continue reading

Show and tell: A brief guide to explainer videos

geek-home-video

Whether you have a story to tell or product to sell, there are multiple benefits to Explainer Videos. Producing short films for online audiences allow you to showcase your wares and expertise, offering an affordable, snappy and entertaining route toward grabbing attention, boosting conversion rates and increasing sales.

With recent research predicting that 79 percent of global consumer Internet traffic will be video by 2018, it’s little wonder that marketers the world over are focusing on the medium of moving pictures and investing in explainer videos, confident of the potential for generating healthy returns.

Continue reading

New ransomware targets Office 365 users

Office 365

A new zero-day malware has been discovered in Australia that affects all of Microsoft’s Office 365 products including Word, Excel, PowerPoint and Outlook.

The malware was discovered by the cyber security company Check Point and comes in the form of an invoice sent by email. The attack is designed to catch unsuspecting victims according to security analyst Raymond Schippers who said: "The email sent to Office 365 users via Outlook gives the appearance of an invoice in the form of an Office document. When they go to open it, a message will appear telling people the document was created with a previous version of the software, so they will need to click something to enable the content".

Continue reading

Load More Articles