Understanding how malware attacks work is vital to defend against them. To ease this process, threat analysts have developed models that map the stages of cybersecurity attacks, allowing defenders to identify areas where they can break the chain and stop the attack. The Cyber Kill Chain is one of these models, developed by Lockheed Martin.
The Department of Information Services in Baton Rouge used geographic information systems and data from 911 calls, search-and-rescue efforts, and more to create a map visualization of the impact of recent floods in the region. The story is a prime example of how IT professionals can put their knowledge to work in emergency situations.
A study by Stanford researchers finds computers can predict lung cancer patient outcomes better than pathologists. While the study is specific to the medical profession, it illustrates the promise and potential of machine learning for IT professionals in any industry.
Sales of traditional slates continue to slip as the more productive detachable form factor finds favor with business users, according to an IDC report. Android slates dominated tablet shipments during the second quarter, but IDC expressed concerns about the platform’s future in the enterprise. Apple’s iOS scored well with consumers and mobile pros, while Microsoft’s Windows platform brought up the rear.
Dell has just launched a major overhaul of Statistica, the company’s advanced analytics platform, updating the user interface, making the platform easier for a wider range of users, expanding in-database analytics to systems including Apache Hive, and adding edge analytics.
Fresh off updates that won it promotion to the Leaders quadrant in Gartner’s Advanced Analytics Magic Quadrant, Dell is issuing another update to the Statistica platform. The two most recent updates address something that’s been an issue for advanced analytics and big data analytics in general: making the systems accessible to users beyond the data scientists and statisticians.
While most top IT executives at companies of all sizes continue to express concern about the security of data in the cloud, that hasn’t slowed their move to embrace this new infrastructure as a home for corporate data. A new survey and report reveal their top security nightmares and provides some recommendations about how to protect data in the cloud.
The Internet of Things (IoT) generates a lot of data, which organizations can store in the cloud. But how are they keeping it all safe?
Hot on the heels of Microsoft’s Project Oxford, Google is bringing its Cloud Vision API into beta. The offering allows software developers to create new ways of reading faces and emotions to help push the limits of what can be done with AI and machine learning.
Earlier this month, Google moved its Cloud Vision API out of limited release into open beta. The tool will enable developers to create apps that can parse the emotional content contained in a photo or image. The API also offers a window into how Google views the future of artificial intelligence and machine learning.
This effort comes at a time when other companies, notably Microsoft, are doing the same.
There’s also a business model here. When announcing the API, Google detailed its pricing scheme for the offering, which kicks in March 1. During the beta timeframe, each user will have a quota of 20 million images per month. Label detection on an image will cost $2 per 1,000 images. Optical character recognition (OCR) comes in at $.60 for 1,000 images.
It’s easier than ever to send a corporate email — and that’s a huge problem. Misleading and meandering messages often clog corporate inboxes and lead to poor communication among colleagues. Here’s a look at five common email mistakes and ways to fix them.
So. Much. Email. If your company could collectively groan, that’s probably the line you’d hear most often.
But here’s an individual groan that we all hear all the time: “Why is nobody reading my email?”
You might hear it from human resources, or finance… maybe even from the IT help desk itself.
Through a partnership with chip maker Movidius, Google plans to bring deep learning to future mobile devices.
Fresh from demonstrating that its artificial intelligence software can defeat a skilled human player of Go, Google is taking steps to embed more intelligence in its mobile hardware.
Sales of PCs continue to fall as more and more people turn to smartphones and tablets for their computing needs. However, Gartner and IDC predict uptake of Windows 10 could provide a market boost later in the year.
Following other AI and facial recognition acquisitions during the last few months, Apple has now snapped up Emotient, a San Diego-based startup that specializes in face-based emotional analysis
Will Google prevail in its legal battles over Android and its search business? Will it thrive under Alphabet? Here are our predictions for Google in 2016.
Google as, it began, is no more. It has been reorganized and now operates as a subsidiary of Alphabet. Yet in its diminished role, it still generates the bulk of Alphabet’s revenue. And it remains the focus of my ill-advised effort to predict the future.
Three common mistakes first-time IT leaders make can freak out staff, get in the way of proving yourself, and ultimately cause you to fail. Here’s how to dodge them.
In over a decade as a CIO. and decades spent mentoring dozens of growing leaders, I have seen some common traps that many new leaders fall into. The good news is that you can avoid them if you know about them. Here are three of the most common ones.
Following an 11-year battle, Nicholas Merrill finally gets to publicly talk about the FBI’s National Security Letter, which demanded he hand over a wide swath of private information about one of his ISP customers.
Nicholas Merrill, founder of a small ISP, disclosed publicly on Monday how broadly the FBI has secretly issued National Security Letters (NSLs) that allow the collecting of data about US citizens without a warrant or judicial oversight.
Online sales in the US were up 16.1% on Black Friday 2015 compared to the Black Friday rush of last year, thanks to email marketing and mobile shopping, according to a Nov. 28 report from Custora E-Commerce Pulse, which tracks data from online retailers and 500 million anonymous shoppers.
Mobile shopping — e-commerce orders made on mobile phones and tablets — accounted for 36.1% of online shopping on Black Friday 2015. That’s a significant jump from the 30.3% of online orders recorded on Black Friday of 2014.
Authorities are looking to handset manufacturers to implement smartphone “kill switches” that are designed to make the devices unattractive to thieves and recoverable for owners. But given their track record, there is no guarantee that smartphone makers will implement the right technology for the job. Smartphone crime is a public safety issue, with police in many cities reporting a related rise in crime: London police say they see 10,000 smartphone thefts per month.