Trump, tech leaders avoided encryption and surveillance talk at summit

A Wednesday summit between some of the most powerful people in technology and U.S. president-elect Donald Trump covered a wide ground but avoided discussion on two of the biggest issues facing the industry: the use of encryption and government surveillance.Trump's team called the meeting the start of "a conversation and partnership in order to spark innovation and create more jobs in the U.S." and said it could be repeated as often as once a quarter once he assumes the presidency.Many in Silicon Valley had been vocal opponents of Trump prior to the election, but in meeting executives of the region's biggest companies on Wednesday, Trump sought to gain their support. In particular, he asked them for "specific innovative solutions that have been blocked by narrow thinking in Washington," his team said in a statement.To read this article in full or to leave a comment, please click here

Trump, tech leaders avoided encryption and surveillance talk at summit

A Wednesday summit between some of the most powerful people in technology and U.S. president-elect Donald Trump covered a wide ground but avoided discussion on two of the biggest issues facing the industry: the use of encryption and government surveillance.Trump's team called the meeting the start of "a conversation and partnership in order to spark innovation and create more jobs in the U.S." and said it could be repeated as often as once a quarter once he assumes the presidency.Many in Silicon Valley had been vocal opponents of Trump prior to the election, but in meeting executives of the region's biggest companies on Wednesday, Trump sought to gain their support. In particular, he asked them for "specific innovative solutions that have been blocked by narrow thinking in Washington," his team said in a statement.To read this article in full or to leave a comment, please click here

Nokia to buy network analytics vendor Deepfield to fight DDoS attacks

Cloud providers and large enterprises don't know enough about what's going on in their networks, according to Nokia.The networking equipment vendor wants to remedy that by enhancing its products with technologies from U.S. IP network analytics vendor Deepfield, which it has just announced plans to acquire. Deepfield provides real-time information about application demand and data flows that Nokia intends to use to help its SDN (software-defined networks) steer traffic.Nokia sees Deepfield's analytics tools as a way to help its customers -- including ISPs and telcos, hosting companies and others operating cloud services at scale -- to better control and protect their networks.To read this article in full or to leave a comment, please click here

Nokia to buy network analytics vendor Deepfield to fight DDoS attacks

Cloud providers and large enterprises don't know enough about what's going on in their networks, according to Nokia.The networking equipment vendor wants to remedy that by enhancing its products with technologies from U.S. IP network analytics vendor Deepfield, which it has just announced plans to acquire. Deepfield provides real-time information about application demand and data flows that Nokia intends to use to help its SDN (software-defined networks) steer traffic.Nokia sees Deepfield's analytics tools as a way to help its customers -- including ISPs and telcos, hosting companies and others operating cloud services at scale -- to better control and protect their networks.To read this article in full or to leave a comment, please click here

4 tips to help you resign without burning bridges

No matter where you rank on the totem pole in your company, it's important to resign from your job gracefully. However, for executives, the resignation process looks slightly different. There is a lot to consider before leaving an executive position and going about it the wrong way can quickly become career-damaging down the road.To read this article in full or to leave a comment, please click here(Insider Story)

14 eyebrow-raising things Google knows about you

Google may know more about me than I know about myself.I'm not just saying that, either: I recently started poking around in Google's personal data repositories and realized that, between my wide-reaching use of the company's services and my own brain's inability to remember anything for more than seven seconds, Google may actually have the upper hand when it comes to knowledge about my life.From face-tagged photos of my past adventures (what year did I go to Nashville, again -- and who went with me to that Eddie Vedder show?) to the minute-by-minute play-by-play of my not-so-adventuresome days (wait, you mean I really only left the house once last Wednesday -- and just to get a freakin' sandwich?!), Google's got all sorts of goods on me. Heck, even my hopes and dreams (which may or may not involve sandwiches) are probably catalogued somewhere in its systems.To read this article in full or to leave a comment, please click here

14 eyebrow-raising things Google knows about you

Google may know more about me than I know about myself.I'm not just saying that, either: I recently started poking around in Google's personal data repositories and realized that, between my wide-reaching use of the company's services and my own brain's inability to remember anything for more than seven seconds, Google may actually have the upper hand when it comes to knowledge about my life.From face-tagged photos of my past adventures (what year did I go to Nashville, again -- and who went with me to that Eddie Vedder show?) to the minute-by-minute play-by-play of my not-so-adventuresome days (wait, you mean I really only left the house once last Wednesday -- and just to get a freakin' sandwich?!), Google's got all sorts of goods on me. Heck, even my hopes and dreams (which may or may not involve sandwiches) are probably catalogued somewhere in its systems.To read this article in full or to leave a comment, please click here

How to maintain security while employees are out of the office for the holidays

Ho-ho, whoaImage by ThinkstockThe downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems. To read this article in full or to leave a comment, please click here

How to maintain security while employees are out of the office for the holidays

Ho-ho, whoaImage by ThinkstockThe downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems. To read this article in full or to leave a comment, please click here

Protecting more than privacy in schools

Larger enterprises have the resources to not only afford the technology needed to grow in the digital age, but they also have the budget and manpower to build security into their overall ecosystems.Does the K-12 education sector have the means to do the same? As the use of technology becomes more prevalent in public schools, will collecting more data potentially increase the cybersecurity risks for the K-12 sector?Earlier this fall, the Center for Data Innovation released a report, Building a Data-Driven Education System in the United States, in which they said 93 percent of teachers are regularly using digital tools to assist classroom instruction in some capacity.To read this article in full or to leave a comment, please click here

Protecting more than privacy in schools

Larger enterprises have the resources to not only afford the technology needed to grow in the digital age, but they also have the budget and manpower to build security into their overall ecosystems.Does the K-12 education sector have the means to do the same? As the use of technology becomes more prevalent in public schools, will collecting more data potentially increase the cybersecurity risks for the K-12 sector?Earlier this fall, the Center for Data Innovation released a report, Building a Data-Driven Education System in the United States, in which they said 93 percent of teachers are regularly using digital tools to assist classroom instruction in some capacity.To read this article in full or to leave a comment, please click here

Privacy protections for wearable devices are weak, study says

The rapidly expanding wearable device market raises serious privacy concerns, as some device makers collect a massive amount of personal data and share it with other companies, according to a new study.Existing health privacy laws don't generally apply to wearable makers, the study says. While consumers are embracing fitness trackers, smart watches, and smart clothing, a "weak and fragmented" health privacy regulatory system in the U.S. fails to give consumers the privacy protections they may expect, said the study, released Thursday by the Center for Digital Democracy and the School of Communication at American University.To read this article in full or to leave a comment, please click here

Privacy protections for wearable devices are weak, study says

The rapidly expanding wearable device market raises serious privacy concerns, as some device makers collect a massive amount of personal data and share it with other companies, according to a new study.Existing health privacy laws don't generally apply to wearable makers, the study says. While consumers are embracing fitness trackers, smart watches, and smart clothing, a "weak and fragmented" health privacy regulatory system in the U.S. fails to give consumers the privacy protections they may expect, said the study, released Thursday by the Center for Digital Democracy and the School of Communication at American University.To read this article in full or to leave a comment, please click here

The top 10 PC technologies and trends to watch in 2017

Though some critics love to knock PCs as dinosaurs, laptops and desktops have gotten sexier, faster and even smarter. For every blue screen of death, there are droves of technological enhancements driving PCs into the era of virtual reality, 4K video and 5G connectivity. Here are the top 10 PC technology and trends to watch next year.VR PCs on your head Intel/IDGNS An Intel employee demonstrates the company's Project Alloy headset on stage during IDF 2016 in San Francisco on August 16, 2016.To read this article in full or to leave a comment, please click here

California mandates energy-efficiency standards for computers

California has become the first state in the U.S. to mandate energy-efficiency standards for monitors and a variety of computers, including notebooks, desktops, workstations and servers.The standards, which come into force starting from from Jan. 1, 2018, focus on the performance of computers in idle, sleep and off modes rather than putting limits on when they are in active operation, said the California Energy Commission, which on Wednesday adopted the new standards.California has more than 25 million computer monitors installed in homes and businesses, and the new standards recommend the use of higher efficiency LED backlights and screen technologies.To read this article in full or to leave a comment, please click here