Twitter has serious flaws that have led to hacked accounts that were then taken over by bad actors. More >
Facebook revealed that it is now making use of artificial intelligence (AI) to identify photos on the social media network. More >
Salesforce LiveMessage lets organizations communicate in a bi-directional manner using services such as Facebook Messenger. More >
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. More >
Avoid falling for social media pitfalls of sharing and trusting too much. This is a time when a little skepticism and being wary can go a long way toward protecting your personal and organizational information. More >
Online communities are driving competitive advantage for many business-to-business (B2B) firms. More >
When registering domains, should we forego the likes of .com, .org, and .net, and adopt generic extensions that are becoming increasingly common?More >
Temporary brick-and-mortar extensions of online retail outlets pop up in various locations to give those retailers a means of providing a touch-and-feel experience to customers.More >
More companies are demanding cloud-based services that are global, but also physically co-located with their regional offices.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
A large majority of security operations centers, or SOCs, have not attained the requisite level of maturity to enable them to adequately protect their organizations against cyberattacks.More >
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...
This report lays the foundation for a rational approach to software metrology, with the scope of the current effort being ...
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...
This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements....