Ballots in Colorado will no longer have QR codes, says Secretary of State Jena Griswold, noting concerns that the codes make the ballots vulnerable to hackers. Colorado is the first state to implement the policy, under which votes will be tabulated based on the easily verifiable marked ovals that appear when the ballot is printed after being cast.
Oracle and VMware have reached an agreement that will allow customers to run VMware vSphere workloads with Oracle's Generation 2 Cloud Infrastructure. The agreement also calls for Oracle to provide technical support for Oracle software running in VMware environments.
Indeed has created a technology-hiring platform, Seen by Indeed, that matches candidates of all skill levels with employers. The service, which is free to job seekers, offers standard membership to employers of $500 per year or a Professional Unlimited membership of $10,000 per year.
The emergence of artificial intelligence can bring increased cybersecurity threats, but it can also be used to guard against vulnerabilities. This article explores beneficial advances made in AI, from biometric authentication to behavioral analytics.
Personal information on nearly every person in Ecuador, including national identification numbers, home addresses and millions of financial records, was exposed in the breach of a server in Miami that was secured last week after the discovery. Among those affected were the president of Ecuador and Wikileaks founder Julian Assange, who received an Ecuadorean ID number after being granted asylum at the nation's embassy in London.
Verizon plans to use 3.5 gigahertz Citizens Broadband Radio Service spectrum to improve its LTE network, but its plans go far beyond that. Verizon executive Adam Koeppe said private wireless networks for enterprises could use CBRS along with 5G and edge computing, with the networks built by the user companies and then linked to Verizon's network.
Derek Handova offers a deep dive into the issue of WebRTC data leaks and how to protect endpoint security and IP addresses. The widely used peer-to-peer protocol is attractive to hackers, and users "have to consider what is the risk of the WebRTC data flaw, compared to the benefit that you get and how much you have to invest to verify a lack of WebRTC data leaks," says Rene Kolga of cybersecurity company Nyotron.
Shell Downstream, NTT Data Services and 7-Eleven are among companies using low-code development platforms to assemble application components, writes Clint Boulton. The drag-and-drop platforms allow developers to arrange applications with relatively little manual programming.
IBM CEO Ginni Rometty sees Amazon and Microsoft as allies in support of clients using different providers as they shift databases to the cloud. IBM signaled a move to a hybrid cloud strategy with its recent $34 billion acquisition of open-source software provider Red Hat.
Comcast, joining the ranks of companies looking to cut into Netflix's share of the streaming market, plans an April debut for streaming service Peacock, which will run both original and classic content. The service is expected to be free to Comcast subscribers, and a source says it might also be free to subscribers of other services.
- Page 1