OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
ECommerceTimes.com
Vendors Jostle to Gain Edge in Growing Federal Cloud Market
February 18, 2015
A major information technology trend within the U.S. government is the gradual -- and apparently inexorable -- migration of federal IT resources to cloud platforms. As the potential for federal cloud adoption has grown, vendors have intensified their marketing and improved their offerings to meet the emerging IT requirements of government agencies.
NSA Suspected of Spreading Super-Resistant Malware
February 17, 2015
Kaspersky Lab on Tuesday announced the discovery of what may be the most sophisticated malware ever. The malware's creators, whom Kaspersky has dubbed "The Equation Group," use a never-seen-before tactic to infect hard drives' firmware. The technique "makes traditional antivirus and antimalware software practically useless," said Protegrity VP of Products Yigal Rozenberg.
Encryption Can Create Stormy Weather in the Cloud
February 17, 2015
Encryption has received a lot of attention lately as a solution to the growing data breach problem, but one of the hang-ups dogging the technology has been its ability to play nice in the cloud. That's especially true if an organization wants to control the keys by which its data is scrambled and use services offered by a cloud provider beyond simple storage.
CFOs Open Purse Strings to Accelerate Cloud Adoption
February 13, 2015
Cloud-based alternatives to traditional hardware and software systems and enterprise applications are experiencing a new level of CxO acceptance. Chief Financial Officers are the latest members of the C-level suite to embrace SaaS, PaaS and IaaS solutions to not only reduce operating costs, but also improve their operating effectiveness so they can better achieve their corporate objectives.
Obama's Cyberthreat Intel Aggregator Plan Divides Security Experts
February 12, 2015
The Obama Administration on Tuesday announced plans to set up a national Cyber Threat Intelligence Integration Center to integrate all data from government agencies and the private sector, and disseminate it appropriately. The intelligence integration center will initially have a staff of 50 and a budget of US$35 million. Reactions from cybersecurity experts were mixed.
Box to Let Enterprises Bring Their Own Keys to the Cloud
February 11, 2015
Box on Tuesday raised the curtain on a new offering that allows its enterprise customers to control the digital keys used to encrypt their data stored in the storage provider's cloud. Box is working with Amazon Web Services and Gemalto to bring to market "Box Enterprise Key Management," and give its most security-minded customers total control over the keys used to encrypt data they store on Box.
Federal 'Internet of Things' Report Triggers Debate, Senate Inquiry
February 10, 2015
Just how close is 'too close for comfort' in the unprecedented connectivity of people, products and electronic communication that lies ahead with the Internet of Things? Should the providers of electronic devices be allowed to know when you set your house thermometer, or how often and how long you go for a jog using a 'wearable' electronic exercise sensor?
Report: Connected Vehicles Vulnerable to Hack Attacks
February 09, 2015
Motorists in the United States are increasingly at risk of cyberattacks and violations of privacy, as more and more technology is added to their cars. A report released on Sunday by the office of Sen. Ed Markey (D-Mass.) listed a number of key findings that are based on responses from 16 auto makers to a letter sent to them by Markey's office.
FCC Chair Submits New Approach for Net Neutrality
February 06, 2015
Some proposed rules that the Federal Communication Commission maintains will prevent content discrimination on the Internet drew fire on Thursday from two policy interest groups. A four-page "fact sheet" on the rules was released Wednesday by FCC Chairman Tom Wheeler. In it, the chairman outlined what he's proposing to the full commission, which is expected to vote on the rules February 26.
SAP Unveils Business Suite 4 SAP HANA
February 05, 2015
SAP on Tuesday debuted its new Business Suite 4 SAP HANA. The application is built on SAP's in-memory platform SAP HANA and sports a number of new features and workflows, as well as a newly-designed user interface. "It is basically a new iteration of the business suite," Simo Said, VP and global head for SAP Enterprise Applications and User Experience, told CRM Buyer.
FTC Argues Against IoT Law, For Now
February 05, 2015
The global "installed and connected base" of IoT units will reach approximately 30 billion in 2020, noted IDC in a November 2014 report. Yet now is not the time to enact privacy or security laws aimed directly at the impact of the IoT, the U.S. Federal Trade Commission says. The FTC argues that such specific legislation could stymie the development of IoT technology.
Good and Samsung Partner to Harden Android Security
February 04, 2015
Good Technology on Tuesday announced a merger of its app container and app ecosystem with the Samsung KNOX enterprise security platform for Android. The product merger is aimed at eliminating virus and malware concerns that come with Android adoption in the enterprise. The hardened security for Android targets the OS's deployment with U.S. government and Department of Defense agencies.
Docker-Rocket Conflict is a Good Sign
February 04, 2015
2014 saw the rise of Docker, and ended with appropriately inflated hype and hysteria around a related container technology: Rocket. Immediately, discussions of uncertainty and doubt, and the familiar fear of forking unfolded. Was it only a matter of time before some developers or organizations splintered off from the Docker community with their own container technology?
AWS Success Underscores Demand for Cloud Services
February 02, 2015
Despite several highly publicized cloud hacks last year -- including the iCloud and Sony breaches -- the demand for cloud services is skyrocketing. Amazon Web Services grabbed 30 percent of the global cloud infrastructure service market in Q4, Synergy Research reports. AWS grew 51 percent year over year (YoY). Why the mad rush to the cloud? Isn't security an issue any more? And who's buying into the cloud?
China May Write New Rules for US Businesses Selling Tech to Banks
February 02, 2015
A group of organizations representing American businesses last week requested urgent discussion and dialog with China's government. They expressed concern about the possible adoption of a policy to ensure that any Internet and information communications technology products Chinese banks purchase from companies outside of China are secure and controllable.
Amazon WorkMail Lifts Back-End Email Burden From IT's Shoulders
January 30, 2015
Amazon is making a play for the enterprise email market. Offered by Amazon Web Services, WorkMail targets companies that want to move their on-premises email services to the cloud. WorkMail reduces complexity and cost. With all mail infrastructure relocated to Amazon's cloud, a company no longer need be concerned with buying hardware, installing patches, and installing mail backup systems.
FCC Issues Tough Warning Against WiFi Blocking
January 29, 2015
The FCC on Tuesday issued a warning that intentional blockage of personal WiFi hotspots was illegal and would be subject to enforcement. The FCC has noticed a "disturbing trend" among hotels and other commercial establishments of blocking consumers' personal WiFi hotspots on their premises, it said. The agency last year conducted an investigation of Marriott International for WiFi blocking.
Canada Levitates Data from File-Sharing Sites
January 29, 2015
Canada's spy agency, the Communications Security Establishment, has been eavesdropping on 102 free file upload sites, including Sendspace, Rapidshare and Megaupload, which has been shut down. A CSE program called "Levitation" lets analysts access information on 10-15 million uploads and downloads of files from such sites daily, according to documents released by whistle-blower Edward Snowden.
Customer Science
January 28, 2015
Part of my new year routine has been ordering new business cards. In this electronic age, they are the only things I actually print, and I'm a writer! In a few weeks I'll publish a book, Solve for the Customer, in paperback, and the two are related. I made a discovery while writing the book that fundamentally changes what I do for a living and the title I use, hence my need to reprint.
Tech-Savvy Cubans Build Their Own Private Internet
January 28, 2015
Because Cuba's government makes it difficult for all but a handful of Cubans to access the Internet, people in Havana and other parts of the country reportedly have linked thousands of PCs to create an informal network known as "StreetNet," or "SNet" for short. The network was built with commercially available equipment. The PCs are connected by WiFi and Ethernet cables strung over rooftops.
Businesses Seek Liability Protection for Cybersecurity Disclosures
January 28, 2015
"No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families," President Barack Obama told the U.S. Congress during the State of the Union Address last week. However, hunting down the perpetrators of cyberattacks that compromise national security or disrupt commerce is only going to get more difficult in the future.
Engage.cx Makes Customers an Offer They Can't Lose
January 27, 2015
Engage.cx just secured $2.9 million in Series A financing. The round of participating investors is noteworthy, but for the CRM industry the real intrigue lays in Engage.cx's premise -- or rather, promise: how to present a unified cohesive customer service operationr, no matter which channel is used. Other vendors claim they can do this, but Engage.cx is taking a novel approach.
Wikileaks Steamed Over Google's Lengthy Silence on FBI Snooping
January 27, 2015
Google may have contributed to violating the First Amendment rights of three journalists working for WikiLeaks two and a half years ago, when it turned over to the FBI all their email, subscriber information and metadata. Google informed the journalists about its actions last month, saying that it had been unable to do so earlier due to a gag order.
Coinbase Bitcoin Exchange Off to a Rocky Start
January 26, 2015
Coinbase on Monday launched Coinbase Exchange, the first regulated bitcoin exchange in the U.S. It got the jump on the upcoming Gemini exchange currently being established by Cameron and Tyler Winkelvoss. The firm debuted in 24 U.S. states, but the launch was bedeviled with problems. Some pages reportedly failed to load completely, and some users had problems with access.

See More Articles in Enterprise IT Section >>
Facebook Twitter LinkedIn Google+ RSS