As businesses increasingly move their operations to the cloud, they’re recognizing the potential to harness the almost limitless compute power available and tap into artificial intelligence and machine learning technologies to deliver insights and value to the business that were previously beyond their reach. Businesses have never been in a better position to create value … continue reading
When IBM CEO Ginni Rometty joined Red Hat CEO Jim Whitehurst on stage at last month’s Red Hat Summit to declare that IBM would leave Red Hat alone after its acquisition, cheers went up from the developers in the keynote audience. Their fear, of course, was that IBM would somehow change Red Hat and move … continue reading
Why do we seem to emulate the ostrich and put our heads in the sand when it comes to personally identifiable information (PII) discovery? Every other technology throughout history that I can think of has undergone multiple phases of evolution, including anti-virus, perimeter security, cell phones, the car – I could go on. So please … continue reading
A majority of organizations are vulnerable to hack attacks because they are still in the dark when it comes to their data. A newly released report reveals more than half of all data within organizations remains unclassified or untagged, which results in an organization’s inability to assess the risk or value of more than half … continue reading
It is becoming increasingly obvious that businesses have too much data to handle, according to Zebra Technologies. Gartner recently forecasted that enterprise spending on public cloud services are on the rise, and businesses need new ways to gain actionable insights for their vast troves of data. Zebra Technologies hopes to tackle that demand with the … continue reading
Many Americans seem resigned to not having control over their data profiles on the Internet. As larger and more sophisticated data breaches are reported in growing numbers, and companies such as Facebook and Google engage in mysterious data activities, technology users are left not knowing who’s got their data, or what they’re going to do … continue reading
Most mobile applications contain at least some programming flaws that make them susceptible to leaking data containing personal information. In fact, mobile applications distributed in Apple’s App Store and Google Play are more likely to have at least one hidden bug that can compromise privacy than they are of containing a security vulnerability, where the … continue reading
We are living in a world where we are more connected than ever, but that connectivity can leave us vulnerable to attack. We communicate online, we shop online and we trust that our personal and private information will be safe online. However, history has shown that isn’t always the case with even the most prominent … continue reading
It’s been one year since the General Data Protection Regulation (GDPR) went into effect. The regulation completely changes how organizations need to handle the data of European Union citizens. The impact of the GDPR, though, has been minimal to this point. Compliance has been slow, enforcement has been lax, and organizations are finding that learning … continue reading
GitHub released the limited beta of GitHub Package Registry, a package management service that makes it easy to publish public or private packages next to your source code. Pricing details will be announced soon. The service is fully integrated with GitHub and it provides fast, reliable downloads backed by GitHub’s global CDN. It also supports … continue reading
Android Q is getting new security features that include encryption, platform hardening and authentication. In the Q release, the company is launching Adiantum, designed to run efficiently without cryptographic acceleration hardware, and to work across everything from smart watches to internet-connected medical devices. Now, all compatible Android devices newly launching with Android Q are required … continue reading
Scalyr, a provider of log management and observability, released a new set of data operations within Scalyr called PowerQueries. Utilizing Scalyr’s real-time processing engine, PowerQueries lets users switch between facet-based search and complex log search operations for complicated data sets, such as grouping, transformations, filtering and sorting, table lookups and joins. “We received a lot … continue reading