Search Results

Results 1-20 of 3157 for Richard Adhikari

Apple’s New Privacy Framework Pressures the Digital Ad Market

Apple's plan to release its App Tracking Transparency (ATT) privacy enhancement feature in early spring has set the ad industry on its ear and triggered a war with Facebook ...

Scientists Press AI Researchers for Transparency

An international group of scientists is demanding scientific journals demand more transparency from researchers in computer-related areas when accepting their reports for publication ...

Cloud Security Practices Playing Into Hands of Attackers

More than 80 percent of 650 cybersecurity and IT professionals surveyed by Check Point Software Technologies in July said their traditional security solutions either do not work at all, or only provide limited functions in the cloud ...

Robot Lawyer Faces Legal Troubles of Its Own

Illinois consumer Matthew Hufnus says that on September 26, he received a number of text messages on his cellphone from a company named DoNotPay, Inc., attempting to solicit his business ...

Cyberthreat Hunter FireEye Hacked by Nation-State Attackers

Cybersecurity firm FireEye, which has been prominent in the fight against nation-state cyberthreats, has been itself attacked by "a highly sophisticated threat actor, one whose discipline, operational security, and techniques," company CEO Kevin Mandia announced Tuesday ...

The Costly Consequences of Crashes in the Clouds

Service outage detection website Downdetector on Nov. 19 reported that the Amazon Web Services (AWS) Internet infrastructure service, which many websites and apps use as a backbone, was having problems ...

Salesforce to Acquire Slack in $27.7 Billion Deal

CRM giant Salesforce on Tuesday signed a definitive agreement to purchase enterprise communications platform Slack, as widely expected ...

Some Smart Home Devices Headed to the ‘Brick’ Yard

The demand for smart home devices is projected to grow steadily over the next few years. Nonetheless, consumers should think carefully before making a purchase due to a trend of manufacturers phasing out "smart" products ...

The Trials and Tribulations of Paying Ransomware Hackers

Hackers hit German enterprise integration and IoT platform Software AG with ransomware twice this month. ...

Whom Can We Trust to Safeguard Healthcare Data?

Healthcare records were digitized to help prevent medical errors such as misdiagnoses and mistakes with medication, but electronic health records (EHR) have made it easier for bad actors to steal patients' highly personal information ...

The Big Tech Regulation Rigamarole

CEOs of three of the five "Big Tech" firms -- Facebook, Twitter, and Google's parent company, Alphabet -- are expected to testify on Oct. 28 at a Senate hearing on their control over hate speech and misinformation ...

Drones for Hire Take to the Sky

When Amazon first proposed using drones to deliver packages back in 2013, it kicked off a firestorm. Google in 2014 disclosed it had been working on a secret drone delivery project, and NASA in 2015 announced it was working on a cloud-based unmanned aircraft systems (UAS) traffic management system ...

Controversial Plan Urges DoD to Recruit Tech Pros to WFH

The United States Defense Innovation Board (DIB) has recommended that the Pentagon hire civilians to work from home who can handle classified information as a way of attracting people with technical expertise ...

SECURITY

The Risks and Consequences of Lax Patch Management

Although software patches can be inconvenient and cumbersome for both enterprises and individual users, these fixes serve an important role in protecting computer systems, which are now vital to everyday life ...

Cybersecurity Conundrum: Who’s Responsible for Securing IoT Networks?

It's hard to beat being able to tell your sound system to select and play a particular song, order something online using just your voice, have your refrigerator tell you when you're running short of food, or have your office printer diagnose itself and demand service automatically from the vendor ...

Tech Job Market Hot for the Near Future

Computer systems design and related services added 13,000 jobs, according to the U.S. Department of Labor's August jobs report ...

The Perils of IT Security Hubris

Corporate cybersecurity has been increasingly compromised since businesses and organizations began implementing work-from-home (WFH) policies in March as the pandemic continued its spread. ...

Reported Data Breaches Decline in H1 2020

Data breaches were rampant in 2019, occurring at an unprecedented pace. However, the first half of this year has seen a reduction in the number of reported events. Reported being the operative word ...

Cash Crunch Could Stymie Municipalities’ Switch to EVs

Municipalities throughout the United States have been switching from diesel- and natural gas-powered vehicles to electric vehicles (EVs), to cut costs and reduce damage to the environment, but the COVID-19 pandemic might slow that trend ...

The Long Journey Into Holographic Transportation

Who can forget Princess Leia's hologram asking for Obi-Wan Kenobi's help in the movie Star Wars? That was perhaps the best-known hologram of the many used in the Star Wars franchise movies, but the power and promise of holographic technology have been depicted in science fiction stories for years ...

LinuxInsider Channels