analysis

Massive Cyber-Attack Shows Risk Of Poor Security On Network Nodes

ANALYSIS: While the details regarding the sources and methods of the Oct. 21 DDoS attack that took down vast areas…

8 years ago

VMworld Europe 2016: VMware Offers Clouds, Clarity and Containers

VMWORLD 2016: VMware offered greater assurances to customers this year, showcasing its showcased its strategy for digital transformation, offering "any…

8 years ago

What New Update Process For Windows 7 And 8.1 Means for Enterprises

ANALYSIS: Beginning this week, all updates will be roll-ups, with complete cumulative updates to begin in 2017, eliminating the ability…

8 years ago

Why Has Universal Credit Been Such A Disaster For The Government?

Universal Credit: DWP battled with GDS, was overly ambitious with timelines and considered suing suppliers

8 years ago

The Battle To Restore Samsung’s Reputation Starts Now

ANALYSIS: Samsung had everything to gain with the Galaxy Note 7, but it has lost a golden opportunity and perhaps…

8 years ago

Using Big Data to Track Hurricane Evacuations

ANALYSIS: Cities and states in the areas of the Southeastern United States hit by Hurricane Matthew were proactive in ordering…

8 years ago

IP Expo 2016: Microsoft CTO, Google And IBM Debate The Future Of Cloud

IP EXPO 2016: Microsoft Azure CTO Mark Russinovich and others discuss the future of cloud and whether security is still…

8 years ago

With Pixel Google Aims to Exert Greater Control Over Phone Support

ANALYSIS: Google's latest effort to produce an Android smartphone to compete with the Apple iPhone looks promising. But will it…

8 years ago

Federal Agencies Working With States to Guard Voter Data Security

Federal authorities saying they are investigating attempts to breach voter registration data and responding to state requests for assistance in…

8 years ago

Weak Device Security Turns IoT Into Powerful Weapon In DDoS Attacks

ANALYSIS: More than a million security cameras, video recorders and other devices were used in attacks on a U.S. security…

8 years ago

BlackBerry’s Smartphone Exit Will Mean Little To Most

ANALYSIS: BlackBerry's smartphone fall from grace is the end of an era but software-focused company has a chance despite previous…

8 years ago

Social Media Analysis Shows Clinton Beat Trump In Presidential Debate

ANALYSIS: Analysis of sentiments expressed on social media showed how viewers' reactions tipped in favour of Hillary Clinton as debate…

8 years ago

iPhone 7 With Faster CPU, Improved Camera Works Fine for Business

REVIEW: Appleā€™s latest version of the iPhone will fit into your business just fine, but you should think about whether…

8 years ago

DDoS Attacks Heading Toward 1-Terabit Record

ANALYSIS: Although a 665Gbps attack is considered an outlier today, there will likely come a day when it is not…

8 years ago

What Should You Do After Massive Yahoo Hack?

ANALYSIS: Hackers have stolen details of 500m Yahoo accounts. Here's what you should do and what businesses should do next

8 years ago

Latest iOS 10 Security Features Help Apple’s Business Case

ANALYSIS: Integration with partners such as Cisco and centrally managed restrictions make iOS 10 a more secure enterprise platform, according…

8 years ago

Oracle Now Lays Claim As World’s One-Stop IT Shop

ANALYSIS: Oracle wants to become what IBM, the original Hewlett-Packard and Dell EMC once aspired to be: the true one-stop…

8 years ago

Why Co-Founder Thinks Documentum Is Doomed Under OpenText

ANALYSIS: John Newton fears the new owner will promise customers investment in their products but that the product lines eventually…

8 years ago

Dell, HPE CEOs Debate the Merits of Their Strategies

Michael Dell says scale is necessary in a fast-changing IT world, while Meg Whitman says being smaller and more nimble…

8 years ago

Three Returns To Underdog Role With Calls For Mobile Spectrum Limit

ANALYSIS: Now the proposed merger with O2 has been blocked, Three has no choice but to make noise and disrupt.…

8 years ago

What 23,000 Attendees Took Away From VMworld 2016

Perhaps the biggest news at the conference was that IBM Cloud became the first partner to use and help sell…

8 years ago

Cold War Group to Probe Russian Hacks of U.S. Voter Databases

ANALYSIS: A little-known cold war group is assigned to investigate suspected hacks into Democratic National Committee and state voter registration…

8 years ago

Why VMware, Pivotal Will Replace Quest as Dell Software

ANALYSIS: Dell and VMware aren't admitting it, but VMware and Pivotal are now, in effect, the new Dell Software

8 years ago

Why WD Is Moving from Hard Driver To DC Equipment Maker

ANALYSIS: The AI/machine learning era is the next arms race for companies looking to compete in the global market and…

8 years ago

At Six Years Old, OpenStack Questions Its Long-Term Viability

ANALYSIS: The future needs ideas like OpenStack, claims founder Jonathan Bryce

8 years ago

Vodafone Hasn’t Really Abolished Line Rental But It Has Made A Statement

ANALYSIS: Vodafone isn't really getting rid of line rental but by combining charges and offering cheap fibre, it shows it…

8 years ago

Windows 10 Linux Feature Brings Real, But Manageable Security Risks

ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…

8 years ago

Windows 10 Anniversary Update Ends As A Tale Of Two Computers

REVIEW: Windows 10 Anniversary Update brings some much needed improvements, but successfully completing the installation can be an adventure

8 years ago

Samsung Positions Itself As Smartphones’ Great Innovator With Note 7

ANALYSIS: Samsung has gone for broke with the Galaxy Note 7 to show it can still innovate in the smartphone…

8 years ago

EE Outrage Shows Roaming Is No Longer An Optional Luxury

ANALYSIS: Few can travel without a smartphone in 2016, which is why EE roaming outage was such an issue for…

8 years ago