How the U.S. can defend its elections from cyberattacks

June 30, 2017

Mandatory Credit: Photo by MediaPunch/REX/Shutterstock (7426437h) Voting Polls Virginia US presidential election voting, Alexandria, Virginia, USA – 08 Nov 2016 Image: MediaPunch/REX/Shutterstock Amid the cybersecurity whirlwind that has been May and Junewhen the world got its first taste of what widespread ransomware attacks are capable of (WannaCry) and the continued wave of attacks that is still unfolding globally (Petya/NonPetya)the publics attention has yet again been pulled away from the news…

Read More >>

Could Trump’s vague plan to expand rural broadband actually work? It’s hard to tell

June 25, 2017

A sign in support of Republican presidential candidate Donald Trump hangs on a farming tractor near a polling station in Cave Creek, Arizona. (Photo by )Image: Ralph Freso/Getty Images If you live in the country, there’s a good chance you don’t have broadband-speed internet. Only one in ten Americans lack access to a connection that meets the government’s new standard for the designation, but more than two thirds of them…

Read More >>

The rise of the Facebook star

June 24, 2017

Image: Laura Clery Laura Clery lives the Hollywood dream. She moved to Los Angeles at 17 to be an actress. She slept on friends’ couches and ate their food as she worked to get an agent and learn the ins and out of the industry. She ended up landing the first commercial she auditioned for. “I was like, ‘Oh, this is easy,’” Clery said with a laugh. Thirteen years later,…

Read More >>

Google exec’s op-ed lists 4-point plan to combat terrorism on YouTube

June 19, 2017

Image: Jeff J Mitchell/Getty Images Following a wave of terrorist attacks in the UK in recent months, Google’s senior vice-president and general counsel, Kent Walker, used one of the leading publications in the country to outline a plan to combat the use by terrorists of Google’s tools. SEE ALSO: Theresa May renews her call for internet regulation following the London Bridge attack On Sunday, Walker posted an op-ed in the…

Read More >>

How Adobe Got Its Customers Hooked on Subscriptions

June 12, 2017

When Adobe Systems Inc. started the transition from a product-sales model to a Change.org petition demanding the company abandon the scheme. Revenue shrank 8 percent in 2013 and was pretty much flat the next year. There aren’t many doubters today. Adobe’s revenue was just shy of $5.9 billion for the fiscal year ended in November, up from $4 billion in 2013; about 80 percent of that came from subscriptions and other recurring sources. Melissa…

Read More >>

The Porn Business Isnt Anything Like You Think It Is

May 23, 2017

Midway through the second season of Silicon Valley, the HBO series that so skillfully spoofs the Bay Area tech scene, the plot turns to porn. Inside the offices of Pied Piper, the fictional startup at the heart of the show, a shaggy-haired coder hacks into a rival company. The rival, he discovers, has landed a $15 million contract with a porn outfit called Intersite, also fictional, agreeing to build software…

Read More >>

Twitter update shares what advertisers are interested in you

May 19, 2017

Image: bloomberg via getty images Twitter just released an update that lets you know who is selling to you and why and gives you the power to stop it. The update, not unlike Facebook’s own, much-more-detailed audience insights, lists your interests and what advertising partners think your interests are, Twitter wrote in a blog post Wednesday. SEE ALSO: Twitter’s search just got a very important update “Today, were announcing a…

Read More >>

Monday Could Bring More Disruptions From Global Cyber-Attack

May 16, 2017

An unrivaled global QuickTake Cybersecurity The malware used a technique purportedly stolen from the U.S. National Security Agency. It affected the U.K.’s National Health Service, Russia’s Ministry of Interior, Germany’s Deutsche Bahn rail system, automakers Nissan Motor Co. and Renault SA, logistics giant FedEx Corp., and other company and hospital computer systems in countries from Eastern Europe to the U.S. and Asia. The hackers used the tool to encrypt files…

Read More >>