At the recent IoT Asia trade event in Singapore, attendees were questioned how far they would go to create a live “internet-ready human being”. Could this be a budding harbinger of the next wave of Internet of Things (IoT)-driven digital...
A Bluetooth vulnerability dubbed BlueBorne, discovered in April, has been made public after companies including Google and Microsoft issued updates. US-headquartered security company, Armis Lab, revealed the vulnerability on 12 September....
Oracle is enabling customers to reuse their existing on-premises software licenses for Oracle PaaS through the release of two new cloud programs titled ‘Bring Your Own License to PaaS’ and ‘Universal Credits.’ Customers...
"We see it every day," says Steven Lentz, CSO at Samsung Research America. "Something coming through, some exploit type, unknown ransomware. We've stopped several things with our defenses, either network-wise or at the end point....
Keybase has unveiled a Slack-style team messaging service that promises to protect private communications with end-to-end encryption. The company launched in 2015 with the aim of making encryption technology more accessible to consumers. Its...
BT has launched BT One Collaborate Spark, a new business collaboration service that allows teams to work together more intuitively and productively regardless of location and device used. The new service brings together the collaboration tools...
What is ITIL? The IT Infrastructure Library (ITIL) is a library of volumes describing a framework of best practices for delivering IT services. The ITIL has gone through several revisions in its history and currently comprises five books, each...
What is a database? Once upon a time, it was simple. The database was a modern Bob Cratchit putting data in tables made up of very straight columns filled with one row per entry. Long, endless rectangles of information stretching on into the future...