Archives by date

You are browsing the site archives by date.

TripIt Pro launches real-time security wait times to help business travelers optimize travel time

techrepublic Top 5 ways to keep your data safe while traveling Airport Wi-Fi, public USB charging stations, and border agents just doing their jobs can all pose a threat to your cybersecurity. Here are five tips to reduce the threats. Read More Seven years ago I started my TripIt Pro subscription and after saving more than $300 on one roundtrip… Read more →

Turn any desk into a standing desk for $31.44

ZDNet’s Business Bargain Hunter scours the web for great deals on computers, phones, services and much more. Prices and availability are accurate at the time deals are shared. Some products and services may not be available outside the U.S. Follow BBH on Facebook and Twitter, where he’s known as The Cheapskate. This attractive laptop table can also be used as… Read more →

Turn any desk into a standing desk for $31.44

ZDNet’s Business Bargain Hunter scours the web for great deals on computers, phones, services and much more. Prices and availability are accurate at the time deals are shared. Some products and services may not be available outside the U.S. Follow BBH on Facebook and Twitter, where he’s known as The Cheapskate. This attractive laptop table can also be used as… Read more →

Electron critical vulnerability strikes app developers

NopSec A critical vulnerability affecting Electron desktop apps has been disclosed. Electron is a node.js, V8, and Chromium framework created for the development of cross-platform desktop apps with JavaScript, HTML, and CSS. Compatible with Mac, Linux, and Windows operating systems, the recently-discovered bug impacts Windows alone. The critical vulnerability affects Electron apps which use custom protocol handlers. Assigned the identifier… Read more →

Electron critical vulnerability strikes app developers

NopSec A critical vulnerability affecting Electron desktop apps has been disclosed. Electron is a node.js, V8, and Chromium framework created for the development of cross-platform desktop apps with JavaScript, HTML, and CSS. Compatible with Mac, Linux, and Windows operating systems, the recently-discovered bug impacts Windows alone. The critical vulnerability affects Electron apps which use custom protocol handlers. Assigned the identifier… Read more →

AWS acquires threat detection firm Sqrrl

Amazon’s cloud business has snapped up Sqrrl, a threat detection software firm with former ties to the US National Security Agency (NSA). techrepublic Top 5 ways to keep your data safe while traveling Airport Wi-Fi, public USB charging stations, and border agents just doing their jobs can all pose a threat to your cybersecurity. Here are five tips to reduce… Read more →

AWS acquires threat detection firm Sqrrl

Amazon’s cloud business has snapped up Sqrrl, a threat detection software firm with former ties to the US National Security Agency (NSA). techrepublic Top 5 ways to keep your data safe while traveling Airport Wi-Fi, public USB charging stations, and border agents just doing their jobs can all pose a threat to your cybersecurity. Here are five tips to reduce… Read more →

3D vision and AI are about to solve the biggest problem in construction

Construction is one of the largest industries in the world, accounting for $10 trillion annually, about 13 percent of global GDP. But while productivity in adjacent industries like petroleum and mining has skyrocketed with the advent of new technologies, productivity in the construction sector has remained flat. A new company called Doxel, which today announced $4.5 million in funding and… Read more →

3D vision and AI are about to solve the biggest problem in construction

Construction is one of the largest industries in the world, accounting for $10 trillion annually, about 13 percent of global GDP. But while productivity in adjacent industries like petroleum and mining has skyrocketed with the advent of new technologies, productivity in the construction sector has remained flat. A new company called Doxel, which today announced $4.5 million in funding and… Read more →

Estonia’s ID card fiasco: ‘We’ve no intention of letting a good crisis go to waste’

Video: How Estonia recovered from ID card hack Despite Estonia’s recent cybersecurity crisis, which also affected its e-residents, the number of digital identity applications received by the tiny Baltic state continues to grow. Last September, Estonia’s prime minister Jüri Ratas called a special press conference to inform the public of a potential security threat that affected almost 750,000 ID cards… Read more →

Estonia’s ID card fiasco: ‘We’ve no intention of letting a good crisis go to waste’

Video: How Estonia recovered from ID card hack Despite Estonia’s recent cybersecurity crisis, which also affected its e-residents, the number of digital identity applications received by the tiny Baltic state continues to grow. Last September, Estonia’s prime minister Jüri Ratas called a special press conference to inform the public of a potential security threat that affected almost 750,000 ID cards… Read more →

​Linux Foundation seeks to bring rhyme and reason to open-source networking projects

Special Feature Next Generation Networks The rising tides of big data, video, and cloud computing are driving tremendous demand for faster and more efficient networks. We delve into how things like software-defined networks (SDN) and new wireless technologies are enabling business transformation. Read More Open source is transforming networking. Ever since OpenFlow appeared in 2011 and showed that we could… Read more →