Thu 17 January, 2019

Quantum-embedded chips could secure IoT

2019-01-17T21:43:48+00:00Thu 17 January, 2019|Tags: , |

Microprocessors that are unique to each Internet of Things (IoT) device is the way forward in the ongoing and tricky quest to secure the IoT, says Crypto Quantique. One idea is that by making each chip one of a kind and unclonable, an application would become almost impossible to hack. The U.K.-base..

Wed 16 January, 2019

IoT for retailers: opportunities and challenges

2019-01-17T05:17:06+00:00Wed 16 January, 2019|Tags: |

The rise of the Internet of Things (IoT) is already having a profound impact on the world of retail, both online and in the brick-and-mortar world. But according to Darin Archer, chief marketing officer of ecommerce software vendor Elastic Path, we haven’t seen nothing yet. Via email, I asked Archer..

Wed 16 January, 2019

Zipping files on Linux: the many variations and how to use them

2019-01-16T21:16:52+00:00Wed 16 January, 2019|Tags: |

Some of us have been zipping files on Unix and Linux systems for many decades — to save some disk space and package files together for archiving. Even so, there are some interesting variations on zipping that not all of us have tried. So, in this post, we’re going to look at standard zipping and unz..

Tue 15 January, 2019

IDG Contributor Network: Zero trust: The transition from legacy to cloud-native

2019-01-16T03:55:39+00:00Tue 15 January, 2019|Tags: , , |

Enterprises operating in the traditional monolithic environment may have strict organizational structures. As a result, the requirement for security may restrain them from transitioning to a hybrid or cloud-native application deployment model. In spite of the obvious difficulties, the majority of en..

Tue 15 January, 2019

Why is Intel without a CEO after seven months?

2019-01-15T18:39:42+00:00Tue 15 January, 2019|Tags: , |

Seven months ago, Intel got a blessing not in disguise when its CEO, Brian Krzanich, was forced out amid a sexual impropriety scandal. Since then, there has been near radio silence and not a hint of who could take the captain’s chair of this $50 billion ship. It stands in stark contrast to the CEO s..

Mon 14 January, 2019

Cisco targets mobile enterprise apps with geolocation technology

2019-01-15T10:18:47+00:00Mon 14 January, 2019|Tags: , , |

Cisco is rolling out a cloud-based geolocation package it expects will help customers grow mobile location services and integrate data from those services into enterprise analytics and business applications. The package, called DNA Spaces, is comprised of Cisco’s Connected Mobile Experience (CMX) wi..

Mon 14 January, 2019

Top 10 IoT vulnerabilities

2019-01-15T02:14:26+00:00Mon 14 January, 2019|Tags: , |

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices ca..

Sat 12 January, 2019

First step to becoming a hacker: Linux!

2019-01-13T00:07:12+00:00Sat 12 January, 2019|Tags: , |

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from no starch press was written with people like you in mind. Authored by OccupyTheWeb, the force behind Hacke..