Latest from TechRepublic
-
More than 91% of files breached in 2017 were controlled by business enterprises
The ITRC reports that of the total number of files breached in 2017, 91.4% were controlled by business enterprises. This is unacceptable--and IT pros know they must do better.
-
3 tips for delivering business insights with data visualization
Data visualization can help organizations make faster and better decisions. Here's how to incorporate it in your company's projects.
-
How wearable sensors helped the US Olympic team win 121 medals at Rio
In preparing for the 2016 Summer Olympics, the US team employed a handful of wearable devices to analyse the performance of its elite athletes.
-
Why your next contactless credit card might have a fingerprint scanner built-in
Contactless credit cards that utilize biometrics, like one recently launched by Gemalto, may help prevent identity theft.
-
Google Cloud Preemptible GPUs: Dirt cheap machine learning with a serious catch
Preemptible options could be 50% cheaper than GPUs with on-demand instances. But, there are some major limitations.
-
Google Drive: Tips and tricks for business professionals
The convenience and flexibility of Google Drive has helped organizations increase productivity and improve collaborative processes, but many users aren’t using the platform to its full potential. This...
-
HP recalls laptop batteries for overheating...again
Eight customers reported battery packs overheating, melting, or charring, leading to minor injuries and property damage.
-
Spectre flaw on iPhones, iPads, Macs, Android: Is your device at risk?
The most recent information on which Android, iOS, and macOS devices are vulnerable and which have been patched to reduce the risk.
-
New Amazon dev kits bring Alexa to mobile accessories and more connected products
The Alexa Mobile Accessory Kit and Alexa Premium Far-Field Voice Development Kit offer developers new opportunities for building products with Alexa integrations.
-
Why cybersecurity in 2018 will be an AI vs. AI slugfest
Cybercriminals will soon rely on machine learning and other AI-based attacks to hammer corporate systems and imitate human behavior, says IBM Security's Caleb Barlow.
-
Digital assistants dominating consumer tech: Here's what it means for business
Increased buy-in may mean more monetization opportunities for advertisers and new ways to reach consumers.
-
36 fake security apps in the Google Play store downloaded malware, stole data, tracked locations
Google has removed several Android apps that secretly harvested user information, according to TrendMicro.
-
How the Meltdown and Spectre chip flaws will impact cloud computing
Mitigations for two critical architectural flaws in CPUs can cause performance degradation, but real-world impact is lower than synthetic benchmarks.
-
Cost comparison calculator: G Suite vs. Office 365
G Suite and Office 365 are the leading contenders in the arena of online productivity suites. This calculator tool and pricing breakdown will help you determine how the various plans measure up in cos...
-
Why we need to stop using personally identifiable information as a form of access
Last year over 2.2 billion personal records were hacked. In 2018 expect data firms to move away from using identifiers like social security numbers, says IBM Security's Caleb Barlow.
-
5 big data focal points for CDOs and CIOs in 2018
The ultimate goal for big data should be integration with everyday business. Here are a few things to keep in mind as you work to get there.
-
How your company can find the best hybrid cloud talent out there
Companies must look for cloud professionals skilled in security, vendor management, and data governance.
-
How to install and use Dockstation for easy container builds
Docker containers can be made incredibly easy with a user-friendly GUI. Jack Wallen walks you through the process of installing one such GUI, Dockstation, to help you with container management.











