Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing

Microsoft announced this week that the company is moving away from passwords. This move may seem sudden, but I was part of a study...

News Around the Web

Why AMD Has Been So Successful: Mark Papermaster

This week Mark Papermaster had a fireside chat with a few of us analysts on the topic of AMD's remarkable rise from the ashes...

11 Tips to Build Scalable Enterprise-Grade Applications

What is your best tip for a business to build a scalable, enterprise-grade application? To help business owners create an enterprise-grade app that can grow...

The Coming AI Threats We Aren’t Prepared For

Artificial intelligence, like any other tool, isn’t inherently good or bad. But AI does automate and emulate other things in ways that make it...

How Facebook Screwed Up Horizon Workrooms

Facebook announced its Horizon Workrooms Virtual Reality (VR) effort in yet another attempt to figure out how to use VR to create an alternative...

Top Stories

Microsoft Gets Rid Of Passwords: I Can Almost...

Microsoft announced this week that the company is moving away from passwords. This move may seem sudden, but I was part of a study IBM did back in the...

Why AMD Has Been So Successful: Mark Papermaster

This week Mark Papermaster had a fireside chat with a few of us analysts on the topic of AMD's remarkable rise from the ashes over the last decade. Papermaster, who...

How Facebook Screwed Up Horizon Workrooms

Facebook announced its Horizon Workrooms Virtual Reality (VR) effort in yet another attempt to figure out how to use VR to create an alternative...

NVIDIA’s Huang Gets Overdue Recognition

The Robert N. Noyce Award is the top honor that the Semiconductor Industry Association (SIA) gives out annually. It is given in recognition of...

DoD Spikes JEDI Cloud Project, Lines Up AWS, Microsoft Behind New Initiative

The Department of Defense’s controversial JEDI project – the $10 billion cloud computing initiative thats been the focus of vendor lawsuits and politics at...

As Tech Industry’s Influence and Power Grow, So Does Political Scrutiny

Twitter's decision to permanently suspend Donald Trump's account after the violent insurrection at the Capitol Jan. 6 was the culmination of an escalating debate...

Security News

Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing

Microsoft announced this week that the company is moving away from passwords. This move may seem sudden, but I...

The Coming AI Threats We Aren’t Prepared For

Artificial intelligence, like any other tool, isn’t inherently good or bad. But AI does automate and emulate other things...

Colonial Pipeline Lessons: Ransomware (and Security) Steps Everyone Should Take

From the SolarWinds hack to the Colonial Pipeline ransomware attack, cybersecurity has entered into public consciousness like never before. How...

IT Management News

Why AMD Has Been So Successful: Mark Papermaster

This week Mark Papermaster had a fireside chat with a few of us analysts on the topic of AMD's...

11 Tips to Build Scalable Enterprise-Grade Applications

What is your best tip for a business to build a scalable, enterprise-grade application? To help business owners create an...

How Facebook Screwed Up Horizon Workrooms

Facebook announced its Horizon Workrooms Virtual Reality (VR) effort in yet another attempt to figure out how to use...

Top Blogs

Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing

Microsoft announced this week that the company is moving away from passwords. This move may seem sudden, but I was part of a study...

Why AMD Has Been So Successful: Mark Papermaster

This week Mark Papermaster had a fireside chat with a few of us analysts on the topic of AMD's remarkable rise from the ashes...

Another Crazy Week in Cybersecurity

Ever since the SolarWinds hack in December, the pace of cybersecurity attacks seems to have picked up, but lately the revelations have been coming...

Colonial Pipeline Lessons: Ransomware (and Security) Steps Everyone Should Take

From the SolarWinds hack to the Colonial Pipeline ransomware attack, cybersecurity has entered into public consciousness like never before. How can you avoid falling victim...