Snowden reveals automated NSA cyberwarfare program

By Grant Gross, IDG News Service | August 13th, 2014 MonsterMind could fire back at suspected attackers without human intervention, Snowden says. The U.S. National Security Agency has a cyberwarfare program that hunts for foreign cyberattacks and is able to strike back without human intervention, according to NSA leaker Edward Snowden. The NSA cyberwarfare program, …

Snowden reveals automated NSA cyberwarfare program Read More »

‘Project Tango’ chip maker Movidius touts faster second-gen visual processor

By Mark Hachman, PC World | August 12th, 2014 If you thought Project Tango’s image-processing chops were pretty cool, the successor chip, called Myriad 2, is 5 to 25 times faster. Movidius, the company that developed the image processing chip behind Google’s Project Tango, claimed that its second-generation chip will begin sampling to customers next …

‘Project Tango’ chip maker Movidius touts faster second-gen visual processor Read More »

Google tightens Gmail spam filtering

By Juan Carlos Perez, IDG News Service | August 12th, 2014 The company is tackling scammers’ use of similar Unicode characters for tricking users into going to malicious websites. Google is boosting Gmail’s ability to detect and block malicious emails from spammers and scammers that exploit similarities among Unicode characters to dupe users into clicking …

Google tightens Gmail spam filtering Read More »

Microsoft Patch Tuesday focuses on Internet Explorer

By Joab Jackson, IDG News Service | August 12th, 2014 Microsoft issued 29 patches for its browser, including one that covers a critical vulnerability. Microsoft has issued 29 patches for its Internet Explorer browser, including one fixing a critical vulnerability that would allow a remote attacker to gain access to a computer from over the …

Microsoft Patch Tuesday focuses on Internet Explorer Read More »

Tipping Point 2.0

Nine months ago, I wrote about how advances in silicon designs and technologies were going to create a product set that will democratize the networking components in modern data centers. Specifically, that the Trident II family of products will perform the role that Xeon did on the compute side and provide the fulcrum on which …

Tipping Point 2.0 Read More »

Tipping Point 2.0

Nine months ago, I wrote about how advances in silicon designs and technologies were going to create a product set that will democratize the networking components in modern data centers. Specifically, that the Trident II family of products will perform the role that Xeon did on the compute side and provide the fulcrum on which …

Tipping Point 2.0 Read More »

3 Cool Google cloud features

By Brandon Butler, Network World | August 12th, 2014 With competition being as intense as ever, Google is attempting to distinguish its cloud offering by appealing directly to developers. In the increasingly competitive cloud IaaS market Google is attempting to distinguish its platform by arming its cloud with unique features and cutting-edge technology that customers …

3 Cool Google cloud features Read More »

Coding platform for IoT could bring data-crunching apps online faster

By Stephen Lawson, IDG News Service | August 12th, 2014 RacoWireless is using standard software tools to help developers connect with any device. The “Internet of things” won’t be built overnight, but vendors are now stepping in to give enterprises a helping hand. The latest offer comes from RacoWireless, which on Tuesday announced a platform …

Coding platform for IoT could bring data-crunching apps online faster Read More »

IBM opening two state-of-the-art disaster recovery/resiliency centers

By Ellen Messmer, Network World | August 12th, 2014 IBM is about to cut the ribbon officially opening two new state-of-the-art data centers intended to provide disaster recovery and resiliency services, one in the Raleigh, N.C. area and other in Mumbai, India. According to Alice Williams, IBM director of strategy and portfolio for global business …

IBM opening two state-of-the-art disaster recovery/resiliency centers Read More »

Amazon protects its virtual desktops with two-factor authentication

By Mikael Ricknäs, IDG News Service | August 12th, 2014 The company’s WorkSpaces service can be used with hardware tokens from Gemalto. Amazon Web Services now lets enterprises use two-factor authentication to better protect hosted WorkSpaces virtual desktops. The steady stream of incidents in which hackers have been able to access traditional passwords highlight the …

Amazon protects its virtual desktops with two-factor authentication Read More »