All posts on October, 2017


Vendors

OpenWorld 2017

I spent last week at Oracle’s OpenWorld 2017 in San Francisco. When I wasn’t drinking from an information fire hose, it was alternately fascinating and exhausting. There were major announcements in database, blockchain, artificial intelligence, cybersecurity, and other stuff I’m associated with only tangentially. For instance, my eyes glaze over when they start talking about bare metal servers.

Read more 0 Comments
Consumer Security

Android Devs May Follow Apple’s Face ID Lead

Apple’s use of facial recognition to unlock its iPhone X may open the gates for developers champing at the bit to bring the technology to the Android world. Face ID, which will replace fingerprint scanning in Apple’s new iPhone X, uses Apple’s TrueDepth 3D camera to verify the owner of a phone. Android developers have been working on similar systems, said Sensible Vision CEO George Brostoff.

Read more 0 Comments
Mobile CRM

AI-Powered Mobile Chatbots Promise More Efficient Customer Service

Helpshift’s new Web Chat application uses AI to help companies release scalable chatbots that can automate customer service through real-time interactions. The new AI-based tool, released last week, will boost Helpshift customers’ ability to provide enterprise-grade support to their customers, according to Helpshift, which specializes in customer support for the gaming industry.

Read more 0 Comments
Tech Buzz

Google Pixel 2: 8/10ths of an Apple-Killer Strategy

What would it take to cause Apple to fail? While Steve Jobs was alive, the prevalent belief was that it would take his removal from the company. That has happened, but Apple’s valuation and reserves are higher. Although the foundational element was removed, no one really went after Apple hard until last week, when Google launched a comprehensive strategy that clearly targeted the company.

Read more 0 Comments
Cybersecurity

Report: Russian Hackers Penetrated Elite NSA Hacking Division

Russian hackers reportedly exploited a vulnerability in Kaspersky Lab’s software to steal sensitive cyberdefense data from a National Security Agency contractor. The incident, which occurred in 2015, involved a contractor who loaded classified information onto his personal computer in order to work at home. The information included hacking tools and other sensitive NSA data.

Read more 0 Comments
Software

With the Shell, You Can Go Wild(card) and Follow Your Pipe Dream

There is more to the shell than commands composed of alphanumeric characters. In addition to those familiar programs, there is a whole host of processing tools hiding behind the symbols of a standard keyboard. To say nothing of their incredible potency in combination, each one is so powerful on its own that it helps to take a methodical approach to get familiar with them.

Read more 0 Comments
Enterprise Security

HPE Gave Russia Deep Dive Into Security Software Used by Pentagon

Hewlett Packard Enterprise has allowed experts working with Russia to review the source code of cybersecurity software that is used by the U.S. Defense Department. The Pentagon uses HPE’s ArcSight software to protect sensitive computer networks. The review of its code was conducted by Russian firm Echelon on behalf of a Russian defense agency that deals with cybersecurity issues.

Read more 0 Comments
Tech Buzz

Gadget Ogling: Same Old Apple

Watching Apple’s product announcement showcase is a bit like celebrating New Year’s. People from all over the world are drawn to this annual event with the promise of something new and exciting, a vision of tomorrow and untold promise. Yet the more it comes around, the more disappointed we are. That promised kiss from a stranger at midnight is a dud. Our best intentions fall by the wayside.

Read more 0 Comments
Emerging Tech

AI Ripples Through Google’s New Product Lineup

Google on Wednesday launched a bevy of new products into its growing hardware and software ecosystem at its Made by Google event. Many of the new devices are infused with artificial intelligence capabilities. “Since last year and since Google I/O, we’ve been working hard, continuing our shift from a mobile-first to an AI-first world,” Google CEO Sundar Pichai told the gathering.

Read more 0 Comments
Software

RoboCyberWall Aims to Block Linux Server Hacks

RoboCyberWall has launched its proprietary precision firewall solution bearing the same name. RoboCyberWall is designed to protect HTTP and HTTPS ports on Linux-based Apache2 and NGINX Web servers. The patent-pending firewall blocks all known exploits and zero-day attacks on Apache2 and NGINX Web servers, according to the developer. The Linux server firewall solution targets small and mid-sized business users.

Read more 0 Comments
Online Entertainment

Roku Sets Up New Streaming Player Buffet

Roku has introduced five new streaming media players designed to provide viewers with new and improved ways to connect to content. The five players range in price from $29.99 to $99.99, and offer a variety of features and functionality. The introductory-level Roku Express targets new cord cutters who want to stream TV content, or those who want to extend their Roku experience throughout the house.

Read more 0 Comments

Under Eclipse, changes to Java EE begin

As part of the change in ownership of Java EE (Enterprise Edition) from Oracle to the Eclipse Foundation, how Java EE works and is managed are starting to change.

For one, Oracle is making the Java EE technology compatibility kits (TCK), which ascertain if an implementation is compliant with Java, available via open source. Eclipse Executive Director Milinkovich called this “a very fundamental change to the dynamics of this ecosystem.”

Under the open-sourcing of the TCKs, users themselves can test for compliance instead of relying on what Milinkovich termed the previous “pay-to-play model” to confirm compliance—with Oracle using the TCKs as a way to exercise control over the Java EE ecosystem, he said. This open-sourcing of the TCKs should hopefully bring other providers to Java EE table, building implementations, Milinkovich added.

To read this article in full or to leave a comment, please click here

Read more 0 Comments