As the internet turns 50, experts weigh future advances and emerging issues
The next 50 years may bring pervasive connectivity, brain-computer interfaces and walled-off areas of the internet.
The next 50 years may bring pervasive connectivity, brain-computer interfaces and walled-off areas of the internet.
Study of 65 countries reveals strengths and weaknesses of digital ecosystems around the globe
… and if this happens, CIOs will be especially impacted, so look well ahead at how a bifurcated network would impact you
Crown company Network for Learning (N4L) says schools and kura across New Zealand are now better protected from cyber threats and harmful websites following the nationwide rollout of new technology.
"New Digital Inclusion Blueprint will be used to coordinate the planning of different government and community initiatives, and identify where future investment and action is needed,” says Research, Science and Innovation Minister Megan Woods.
Healthcare CIOs have been given a great gift for their efforts to deal with the transformation from pay-for-service to pay-for-value -- wearable devices. Strategically minded CIOs will aggressively take action to help their organization leverage this technology for big data analytics and population health management.
Twitter recently unveiled its latest effort aimed at improving your safety and security: a new Safety Center hub, which aims to cut down on abusive behavior and arm you with information about its tools and policies.
Last month, during an editorial offsite on the Atlantic shores of Cape Cod, the CIO team shared some tips and advice with each other on how to be more productive and improve our online personas. At CIO, we know the knowledge and insights we gain from our peers can be invaluable, and that's one reason we're all active LinkedIn users.
According to a 2014 HP report, titled Internet of Things Research Study, 70 per cent of the most commonly used Internet of Things (IoT) devices contain vulnerabilities involving password security, permissions and encryption.
As companies adopt more cloud IT services and work with an increasing number of service providers, the tried-and-true IT towers of the past no longer serve their needs. "The old model lacks the clarity of ownership required to drive decisions on as-a-service offerings that span the traditional tower structure," says Steve Keegan, principal with outsourcing consultancy Pace Harmon. "Determining who makes the call isn't straightforward -- the server team, the app team or the database team?"
Policing social media sites is no easy task, because users can post almost anything they want, often without consequence. Other users can report inappropriate content, but it's not possible for social networks to remove every post that violates their guidelines.
Next time you receive an invitation to connect on LinkedIn from someone unfamiliar, think twice before you accept. This is not only sound advice, it's part of LinkedIn's official rules. Section 8.2 of the site's user agreement specifies that members agree not to "invite people you do not know to join your network." While Facebook and Twitter are great for broadcasting random thoughts and bragging about your private life to complete strangers, LinkedIn is designed to be personal and relevant to your professional life.
Government CIOs in states and local districts increasingly are looking to push applications to the cloud, but security and a reliable user experience remain principal challenges, a new survey reports
We're just a couple months shy of the big EMV liability shift. That's when companies that don't accept chip-enabled debit and credit cards take on financial responsibility for hacks and fraud.
Social media can be a fun part of your day. You get to interact with friends, family and strangers -- and maybe if you're lucky, get a retweet from your favorite celebrity. But as much as you may like to put yourself out there, it can be easy to forget that your public social media accounts are just that: public.
Symantec has established one of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 63.8 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services, such as Symantec DeepSight™ Intelligence, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources.