A look at Oracle’s 10 biggest acquisitions

Oracle is back at it again today, announcing one of the largest acquisitions in company history with the purchase of enterprise resource planning (ERP) company NetSuite for $9.3 billion.+MORE AT NETWORK WORLD: Details of Oracle’s NetSuite takeover | Can Oracle buy its way into the cloud? +Larry Ellison and crew are no strangers to acquisitions. The company has made many over the past few decades. For Ellison though, cloud acquisitions are particularly noteworthy, given that not too long ago he derided the market as a fad.To read this article in full or to leave a comment, please click here

Amazon’s cloud business continues upward march

Amazon reported another surge in revenue for its cloud business last quarter, though the growth is slowing as the division gets bigger.Amazon Web Services revenue for the second quarter was $2.87 billion, up 58 percent from the same period in 2015, Amazon announced Thursday. Operating profit was $863 million, up from $391 million a year earlier.It's another positive sign for AWS, which is still the leader in public cloud services, even as IBM, Microsoft and Google step up their efforts to complete.The growth at AWS is slowing, however, which is typical for a company as its business gets bigger. The gain was 64 percent in the first quarter, and 69 percent the quarter before that.To read this article in full or to leave a comment, please click here

Is the next big thing VR, AI and Robotics? Or is it already here. Recap of AT&T Shape 2016

Attend any technology conference today (2016) and I bet you there is going to be a track for IoT (Internet of Things), VR (Virtual Reality), AI (Artificial Intelligence) and other buzz words like deep learning, machine learning, big data, robotics et all. Almost all industries across the board either already have something or in the process of inventing something that inches us closer to SkyNet and science fiction. Academia which is always a few years ahead of the industries also heavily invests in these topics.  VR, AI, Robotics and Machine Learning are few of the top research topics of 2016 listed by IEEE.

© Arun Sriraman
I was lucky to attend one such conference - AT&T Shape this year (2016) held at AT&T Park in SF on the 15th-16th of July. AT&T Shape is about showcasing future technology - a preview into what's possible & what's coming in the next few years. This year most of the exhibits & demos were VR, Robotics and AI themed. And speaking of machine learning/AI - look at the video above. It's a video generated by Google using the photos & videos I captured during the event. Google automatically has figured out the Continue reading

22% off iHealth Oxygen level, Pulse rate, and Perfusion Index Monitor – Deal Alert

This handy meter gives fast and reliable readings of your oxygen level, pulse rate, and perfusion index, wirelessly on your smartphone or tablet. Using the iHealth app, easily record and save your data to the secure, HIPPA compliant iHealth cloud for meaningful results you can track over time for yourself or a caregiver. This iHealth monitor typically lists for $69.95, but is currently discounted 22% to $54.33. See the discounted item now on Amazon.To read this article in full or to leave a comment, please click here

Bugs & Bugs: National Moth Week, PHP, Black Hat & more

National Moth Week, Black Hat exploit presentations, edible insects, Pornhub's bug bounty, Flash vulnerabilities and Zica prevention at the Rio Olympics all came up on this week's Bugs & Bugs Facebook Live event, the program on which we discuss the latest in computer bugs and real insects (view saved version of video below).As my colleague Tim Greene, our resident IT security editor discusses, next week's Black Hat event in Las Vegas will be filled with intriguing presentations by white hat hackers sharing their latest exploits, including one involving Bluetooth Low Energy that could impact internet of things devices. Tim also hits on researchers taking Pornhub up on its $20K bug bounty challenge, which turns out to benefit PHP developers everywhere, and dives into the latest on Flash exploits, which Cisco warns can lead to ransomeware attacks.To read this article in full or to leave a comment, please click here

Bugs & Bugs: National Moth Week, PHP, Black Hat & more

National Moth Week, Black Hat exploit presentations, edible insects, Pornhub's bug bounty, Flash vulnerabilities and Zica prevention at the Rio Olympics all came up on this week's Bugs & Bugs Facebook Live event, the program on which we discuss the latest in computer bugs and real insects (view saved version of video below).As my colleague Tim Greene, our resident IT security editor discusses, next week's Black Hat event in Las Vegas will be filled with intriguing presentations by white hat hackers sharing their latest exploits, including one involving Bluetooth Low Energy that could impact internet of things devices. Tim also hits on researchers taking Pornhub up on its $20K bug bounty challenge, which turns out to benefit PHP developers everywhere, and dives into the latest on Flash exploits, which Cisco warns can lead to ransomeware attacks.To read this article in full or to leave a comment, please click here

Verizon, AT&T find new markets as traditional revenues flatten

With their purchases of DirecTV, AOL and Yahoo, the nation's two biggest wireless carriers -- AT&T and Verizon -- have pivoted beyond their traditional business in the search for alternative revenues.Those purchases -- the latest being Verizon's announcement Monday to snap up Yahoo for $4.8 billion -- came about because the carriers realized more than two years ago that traditional wireless services are becoming saturated in the U.S. As a result, wireless services revenues have shrunk or remained flat in recent quarters.To read this article in full or to leave a comment, please click here

Intel has quietly snuffed out its Project Tango smartphone as it rethinks augmented reality

Intel's RealSense 3D camera technology was the star of last year's Intel Developer Forum in San Francisco. Along with robots and drones that used RealSense to "see" the world around them, CEO Brian Krzanich showed the first prototype smartphone to incorporate the technology.The phone went on sale in January for US$399, along with a software kit that allowed developers to built augmented reality applications using RealSense and Google's Project Tango platform. It put Intel on the front edge of mobile AR, a technology that's now having its breakout moment thanks to Pokémon Go.To read this article in full or to leave a comment, please click here

Google lets third parties extend its productivity software on Android

Google is using third parties to make its productivity apps more useful on Android. The company announced Thursday that it's now possible to bring functionality from apps like Scanbot, DocuSign, and ProsperWorks into Docs and Sheets on its mobile operating system.The third-party add-ons will let users do things like access CRM data, start to electronically sign a document, and create mobile apps based on data they have stored in a spreadsheet. The new add-ons are aimed at making it easier for people to get work done within Google Docs and Sheets while they're on the go.Google is in tight competition with Microsoft to attract users to its productivity suite, and both companies are working to bring the power of third-party applications into the apps people already use to get things done.To read this article in full or to leave a comment, please click here

PQ Show 87: Private Cloud Is For Real

Todays Priority Queue looks at the real state of private cloud. While public cloud gets the most media attention, and some analyst firms argue that private cloud doesnt make sense for most companies, its a myth that theres only one way to do cloud. The post PQ Show 87: Private Cloud Is For Real appeared first on Packet Pushers.

Anticipating Black Hat

I was at CiscoLive a few weeks ago in the 100 degree+ heat of Las Vegas and like other cybersecurity professionals I am off to Sin City again next week for Black Hat.Now Black Hat has become a technically-focused little brother of the RSA Security Conference, chock full of cybersecurity geeks at the beginning of the week and forensic investigators, researchers, analysts, and hackers as Black Hat turns to Defcon.  Given this focus, I’m looking forward to hearing about a number of things including:1.      Anti-ransomware fact and hyperbole.  Last December, I predicted a rise in ransomware in my blog, even going so far to talk about enterprise ransomware that impacted multiple systems on the network simultaneously.  Unfortunately, I was right about this one as ransomware has become a cybersecurity scourge of 2016.  Nasty stuff and once you’re hit, there is little you can do except replace the hard drive, reimage systems and hope you’ve done a recent full backup.  Alternatively, you can pony up a bunch of rubles to Vladimir in Odessa.  Nevertheless, there are in fact ways to prevent ransomware before it bricks your system.  New types of Continue reading

Anticipating Black Hat

I was at CiscoLive a few weeks ago in the 100 degree+ heat of Las Vegas and like other cybersecurity professionals I am off to Sin City again next week for Black Hat.Now Black Hat has become a technically-focused little brother of the RSA Security Conference, chock full of cybersecurity geeks at the beginning of the week and forensic investigators, researchers, analysts, and hackers as Black Hat turns to Defcon.  Given this focus, I’m looking forward to hearing about a number of things including:1.      Anti-ransomware fact and hyperbole.  Last December, I predicted a rise in ransomware in my blog, even going so far to talk about enterprise ransomware that impacted multiple systems on the network simultaneously.  Unfortunately, I was right about this one as ransomware has become a cybersecurity scourge of 2016.  Nasty stuff and once you’re hit, there is little you can do except replace the hard drive, reimage systems and hope you’ve done a recent full backup.  Alternatively, you can pony up a bunch of rubles to Vladimir in Odessa.  Nevertheless, there are in fact ways to prevent ransomware before it bricks your system.  New types of Continue reading

Changing the Exascale Efficiency Narrative at Memory Start Point

With this summer’s announcement of China’s dramatic shattering of top supercomputing performance numbers using ten million relatively simple cores, there is a slight shift in how some are considering the future of the world’s fastest, largest systems.

While one approach, which will be seeing with the pre-exascale machines at the national labs in the United States, is to build complex systems based on sophisticated cores (with a focus on balance in terms of memory) the Chinese approach with the top Sunway TaihuLight machine, which is based on lighter weight, simple, and cheap components and using those in volume, has

Changing the Exascale Efficiency Narrative at Memory Start Point was written by Nicole Hemsoth at The Next Platform.

Long-running malvertising campaign infected thousands of computers per day

Security researchers have shut down a large-scale malvertising operation that used sophisticated techniques to remain undetected for months and served exploits to millions of computers.The operation, dubbed AdGholas, has been running since at least October 2015. According to security vendor Proofpoint, the gang behind it managed to distribute malicious advertisements through more than 100 ad exchanges, attracting between 1 million and 5 million page hits per day.The Proofpoint researchers estimate that 10 to 20 percent of computers that loaded the rogue ads were redirected to servers hosting exploit kits -- web-based attack tools that attempt to silently exploit vulnerabilities in popular applications in order to install malware.To read this article in full or to leave a comment, please click here

Long-running malvertising campaign infected thousands of computers per day

Security researchers have shut down a large-scale malvertising operation that used sophisticated techniques to remain undetected for months and served exploits to millions of computers.The operation, dubbed AdGholas, has been running since at least October 2015. According to security vendor Proofpoint, the gang behind it managed to distribute malicious advertisements through more than 100 ad exchanges, attracting between 1 million and 5 million page hits per day.The Proofpoint researchers estimate that 10 to 20 percent of computers that loaded the rogue ads were redirected to servers hosting exploit kits -- web-based attack tools that attempt to silently exploit vulnerabilities in popular applications in order to install malware.To read this article in full or to leave a comment, please click here