OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
ECommerceTimes.com
China Seeks Answers About NSA/Huawei Report
March 25, 2014
China's government is asking the U.S. to explain itself -- and to knock it off with all the cyberespionage -- following reports that the National Security Agency has had its way with Chinese telecom giant Huawei. The NSA reportedly penetrated Huawei servers to monitor communications among company executives, and to gain access to the dealings of Huawei customers.
Rumor vs. Reality in Silicon Valley, Part 1
March 25, 2014
Like most small, inbred communities, Silicon Valley encourages and thrives on gossip, even when it's of little substance. In popular-speak, Valley gossip has a "low signal to noise ratio," but the rumor mill is vibrantly alive despite that shortcoming -- partly due to venture capitalists, whose efforts parallel the day-to-day business of technology.
Netflix, Comcast Spar Over Net Neutrality
March 24, 2014
Although they previously came to an arrangement regarding stronger broadband service delivery, Netflix and Comcast last week sparred over the issue of Net neutrality in a public forum. Net neutrality -- or "open Internet" -- is the concept that all Internet traffic should be treated equally by Internet service providers and governments. ISPs should not give preferential treatment.
New Avaya Platform Defrags Customer Experience
March 20, 2014
Avaya has rolled out an upgraded CEM platform with two new major components: the proactive outreach manager and intelligent customer routing. The common theme in this product's enhancement is the unification of inbound and outbound customer engagement with self service across any media, explained Avaya's Cory Glover, senior manager in the customer experience solutions marketing team.
Office for iPad May Be Waiting in Wings
March 20, 2014
Microsoft's tip of a news event next week triggered an avalanche of prophecy that the long-awaited version of Office for the iPad was about to be released. Microsoft is billing the event in San Francisco on March 27 as a "briefing and news focused on the intersection of cloud and mobile computing." Microsoft officially withheld further details, but an assortment of unnamed sources did not.
Federal Mobile Market: Vendors Be Nimble, Vendors Be Quick
March 19, 2014
The U.S. government will be a prime target for mobile information technology vendors offering a variety of devices, associated telecom services, and mobile management assistance over the next several years. By 2017, annual federal spending on a wide range of mobile IT capabilities could approach $10 billion. Vendors will need to demonstrate that their offerings provide value and effectiveness.
All Hacks on Deck: Japan Invites Hackers to Go At Government
March 18, 2014
Japan invited hackers -- nice ones, that is -- to go to town on the nation's government departments Tuesday. The move is designed to expose weaknesses in cyberdefenses and bolster national security ahead of the 2020 Olympics. Japan enlisted 50 cyberdefense specialists to gather at an emergency response center in Tokyo; an additional 100-plus were stationed offsite.
Zuckerberg Bends the President's Ear
March 14, 2014
CEO Mark Zuckerberg posted on Facebook that he called President Obama to complain about NSA surveillance. "The Internet is our shared space," he wrote. Most people "work together to create this secure environment and make our shared space even better for the world. When our engineers work tirelessly to improve security, we imagine we're protecting against criminals, not our own government."
Complicating the Cloud
March 14, 2014
Although I've been a proponent of the business benefits of migrating to the "cloud" since before the term was popularized by today's market leaders, I have to admit that the cloud industry is doing a great job of making it increasingly difficult for CIOs and other corporate decision makers to feel confident about making the move. Cloud converts aren't sure where to start.
NSA Deploys Botnet Armies, Spoofs Facebook
March 13, 2014
The latest revelations about NSA surveillance indicate the agency could infect millons of computers with malware, and has spoofed Facebook servers to capture traffic from targets. "It is not surprising that the NSA would create and deploy malware," said CDT's Harley Geiger. "What is surprising is the evidence the NSA is prepared to do so on a scale that could affect millions of computers."
Berners-Lee Dreams Impossible Dream
March 13, 2014
Tim Berners-Lee, known as the "father of the Internet," has called for an online bill of rights. Twenty-five years ago, Berners-Lee wrote a proposal for what would become the Internet as we know it today, making the case that it needed to move toward a decentralized, open architecture and away from the proprietary linear structure that was emerging at the time.
Feds, IT Vendors See Clearer Path to the Cloud
March 13, 2014
Federal agencies have been diligently pursuing the use of cloud-based information technology for the past three years in compliance with a White House directive. As a result, federal spending on cloud-based technologies reached $2.3 billion in fiscal 2013, according to a market assessment by Deltek. That investment level could top $6 billion annually in a few years.
Feinstein Accuses Spooks of Spying on Senate
March 12, 2014
A powerful U.S. senator has accused the CIA of spying on a network drive legislative staffers used to prepare a report on abuses -- including torture -- in the agency's detention and interrogation program. The search may have violated the separation of powers clause of the U.S. Constitution, Senate Intelligence Committee Chairman Diane Feinstein, D-Calif., told the Senate on Tuesday.
How to Encrypt a Windows 8 PC Drive
March 12, 2014
Real-life events -- the disclosures from website WikiLeaks; Edward Snowden's leaks of classified government documents to media outlets; credit card hijacks by the server load; and even Facebook's stumbles over its privacy policy explanation to the masses -- have created a general sense of unease when it comes to privacy these days, even at the consumer level.
Lenovo: IBM Strike's Not Our Problem
March 11, 2014
Chinese PC maker Lenovo is washing its hands of a wildcat strike at an IBM factory in Shenzhen, China. In January, Lenovo purchased one of IBM's server businesses, and the striking workers -- more than 1,000 of them -- are among those who will be absorbed by Lenovo. The $2.3 billion deal is not yet final, and Lenovo doesn't want to get stuck with any of IBM's headaches until the ink is dry.
Google Doles Out Cash for Apps Referrals
March 11, 2014
Google has launched a referral program for its office apps. It will hand out $15 bonuses to Google Apps customers who convince new users to sign up for the service, which includes Gmail for businesses, Google Calendar, Docs, Slides, Hangouts and Google Drive. Google will award the $15 bonus for up to 100 new user referrals, with each user in a domain counting as a referral.
Salesfusion Bumps Up Lead Scoring in New Marketing Automation Release
March 10, 2014
Salesfusion has released a new version of its marketing automation platform enhanced with the lead-scoring capabilities it acquired with its purchase of LoopFuse. The end result of this newly integrated product is a marketing automation application that has predictive lead scoring and is priced and configured to be used by mid-market companies, said Salesfusion CEO Christian Nahas.
Turkey PM, Prez Go Round and Round About Social Media
March 10, 2014
Turkey's prime minister and president are spewing conflicting talking points on the nation's stance toward social media. It turns out the one who's getting nailed on social media is the one who wants more restrictions. Prime Minister Recep Tayyip Erdogan last week vowed to restrict social media after this month's local elections, but President Abdullah Gul said that was "out of the question."
The Increasing Business Risk of Cloud Cyberattacks
March 10, 2014
It is hard to figure out which is growing at a faster pace -- movement to the cloud or cybercrime. Cybercrime is following the data to the cloud, according to reports, to find and steal cloud data of hotel records, credit card information, and maybe even corporate secrets and the client files of lawyers. The concept of managing data for business on a remote computer is actually 50 years old.
The Amazing Promise of HP's Impossible Turnaround
March 10, 2014
HP has made incredible progress over the last few years with Meg Whitman at the helm, which was evident at its annual analyst meeting last week. It has made major progress in the cloud, in devices, and in how the company is run. The result should be an increasingly interesting set of products and services uniquely differentiated in the market. This effort was far from easy.

See More Articles in Enterprise IT Section >>
Facebook Twitter LinkedIn Google+ RSS