Information security experts today praised the attention U.S. President Barack Obama is lavishing on cybersecurity, but have some concerns about how proposed legislation will be implemented and enforced while others say the proposals don't go far enough.
Stories by Thor Olavsrud
In just a few short years, big data technologies have gone from the realm of hype to one of the core disruptors of the new digital age. 2014 saw big data initiatives inside the enterprise increasingly move from test to production. In 2015, big data will push further into the enterprise with even more use cases -- specifically real-time use cases -- says John Schroeder, CEO and co-founder of Hadoop distribution specialist MapR.
In information security circles, 2014 has been a year of what seems like a never-ending stream of cyberthreats and data breaches, affecting retailers, banks, gaming networks, governments and more.
It's no secret that many IT professionals in large enterprises look down at public clouds -- they don't consider them reliable, secure or safe. But that perception may be shifting, at least when it comes to big data workloads.
IBM is investing $US1 billion in its IBM Watson Group with the aim of creating an ecosystem of startups and businesses building cognitive computing applications with Watson. Here are 10 examples that are making an impact.
Intel and Parkinson's disease researchers have begun outfitting patients with devices to begin gathering data.
When it comes to big data projects, the biggest challenge most organizations face, regardless of size, is staffing, says Peter Guerra, a principal in Booz Allen Hamilton's Strategic Innovation Group.
Over the past few years, Hadoop and big data have exploded onto the tech landscape, garnering attention on par with cloud and mobile. But that may all be about to change, says Mike Olson, co-founder, chairman and CSO of Hadoop distribution vendor Cloudera.
The term "shadow IT" has become a bugbear for IT organizations in recent years, an unknown that brings to mind security vulnerabilities or even suggests IT's creeping irrelevance to the business. But CBS Interactive CIO Steve Comstock says that's the wrong way to think of shadow IT. Instead, he says, IT should view shadow IT as an opportunity to understand the business and how to be an actual partner that understands the business's needs.
Despite making up slightly more than half the U.S. population and filling slightly more than 50 percent of professional positions in the U.S., the percentage of women in technology jobs in the U.S. has been in decline. Intel sees that as a big problem with many causes, says Raejeanne Skillern, general manager of the Cloud Service Provider Business at Intel.
A little more than a year ago, Conservation International (CI) was wrestling with a mammoth big data problem.
An overwhelming majority of executives from companies that have brought big data projects to production are pleased with the results, according to new research by Accenture Digital. However, they also cite security as the major challenge they face.
Despite the massive scale of the theft of Personal Identifiable Information (PII) and credit card and debit card data resulting from last year's data breach of retail titan Target, the company's PCI compliance program may have significantly reduced the scope of the damage, according to new research by security firm Aorato, which specializes in Active Directory monitoring and protection.
There is a festival atmosphere here at the 2014 U.S. Open tennis tournament as hundreds of thousands of fans gather to see tennis stars and up-and-comers alike vie for prize at the last Grand Slam competition of the tennis year.
Running a social media hub for any large event poses a challenge, but perhaps none quite so daunting as running the FIFA Social Hub, the official social platform of the 2014 FIFA World Cup.