Web

Web / Most Viewed

How to Secure Your Data During Coronavirus

Nobody loves a good crisis more than a hacker and, by anyone's definition, coronavirus is a big, fat stinking crisis that almost everyone on earth is sitting in the middle of. For most of us, a crisis brings out the best. First responders and the healthcare systems are replete with stories of superhuman sacrifice and commitment to others. Unfortunately, it is this commitment to the work at hand that puts cybersecurity on the back burner and increases the chance of a breach, break-in, or general mischief. more

The Worrying Prospects for Digital Trade Under President Trump

US leadership and influence online stems from US innovation and corporate risk-taking. But it also is the direct result of US Government policy. In the early days of the web and e-commerce, the Clinton administration recognized they had to figure out a strategy to reconcile the internet, which is global, with laws and regulations, which are domestic. Instead of demanding negotiations for shared global rules, Administration officials put forward a set of principles, which they called the Framework for Global Electronic Commerce. more

Chromebooks, Google’s Long-Waited Laptop, to Ship Next Month

Google yesterday dove deep into its Chrome notebook project at its annual Google I/O conference. The company has had the notebook operating system in beta for almost two years now. Google announced the first market-ready Chromebooks from partners Samsung and Acer. The Chrome OS is dependent on the cloud for storage and various web-based applications. The result is a machine that boots in a matter of seconds and carries very little in the line of native hardware. more

Google Internet Traffic Continues to Soar

Craig Labovitz reporting today on Arbor Networks blog: "In their earnings call last week, Google announced a record 2010 third-quarter revenue of $7.29 billion (up 23% from last year). The market rejoiced and Google shares shot past $615 giving the company a market cap of more than $195 billion. This month, Google broke an equally impressive Internet traffic record -- gaining more than 1% of all Internet traffic share since January. If Google were an ISP, as of this month it would rank as the second largest carrier on the planet..." more

Can We Control the Digital Platforms?

The digital market has matured over the last 20 years, and it is no longer an excuse for governments to do nothing with the aim to let new markets and innovations emerge without immediate regulatory oversight. It has become clear this period is now well and truly over. The European Commission has already launched several lawsuits against the digital giants. Regulation, in general, is known as "ex-post" (after the deed has been done). This is set to change, as I will explain later. more

Who Is Driving Buzz and Engagement With NFTs?

Marketers far and wide have piled onto the non-fungible token (NFT) craze. To some great success and fanfare, NFTs are being used to promote and monetize media, goods, and services in almost every segment. Media, Fashion, Entertainment, Sports, Gaming, Art, Beverage, Consumer Goods, Financial, and even Enterprise Software companies are getting into the mix. This brief review examines why, how, and where marketers are using NFTs, how NFTs are being abused and gives high-level advice to marketers and brand protection professionals. more

Microsoft Data Suggests 1 Out of Every 14 Downloads is Malware

Microsoft Program Manager, Jeb Haber, reports in a blog post that from browser data collected on user downloads, 1 out of every 14 programs downloaded is later confirmed as malware. Haber says: "Consumers need information to make better decisions. That said, IE9 adds another layer of defense against socially engineered attacks that now looks at the application being downloaded -- this is in addition to the URL-based protection described above. This new layer of protection is called SmartScreen Application Reputation." more

Internet 2008 in Numbers

In a blog post today, Royal Pingdom has posted a variety of statistical answers to questions for 2008 such as: How many websites were added? (A: 31.5 million) How many emails were sent? (A: 210 billion per day) How many blog posts were published? (A: 329 million) Other numbers include total number of Internet users in the world which, according to June 2008 data, is recorded at 1,463,632,361 with Asia having the highest percentage of users (39.5%) followed by Europe as the second largest (26.3%) and North America as the third (17%). Numbers have been gathered using a wide variety of sources from around the Web. more

Mobilizing the Internet Community for Coronavirus Pandemic Communications

The Coronavirus pandemic has profound impact on every aspect of every person's life. We all have turned to the Internet to stay informed on this one subject. Unfortunately, the Internet community is not equipped to organize the Internet around one subject. Governments and businesses are reorganizing their websites daily to make new paths to new coronavirus information on many topics suitable for their many audiences. more

Gordon E. Moore, Co-Founder of Intel and Father of Moore’s Law, Passes Away at 94

Gordon E. Moore, the co-founder and former chairman of Intel Corporation, passed away on Friday at his home in Hawaii. He was 94. Moore was widely known for his 1965 prediction, which became known as Moore's Law. more

Survey Says Internet Won’t Make Us Stupid

Or at least majority of 895 technology stakeholders' and critics' that were recently surveyed by the Pew Research Center's Internet & American Life Project and Elon University's Imagining the Internet Center. Some of the quantitative results from the expert group include the following... more

Diagnosing Load Test Errors - Where to Start for Holiday Success

Picture this: you just completed hours of internal Web services preparations with your system administrative team prior to the holidays. You discovered possible points of failure and made appropriate modifications with the expectation of a perfect load test. You take a few minutes to relax, refill the coffee mug sitting in front of you, and connect to the conference bridge where real-time discussion about the load test will occur. Things go well for the first 20 minutes of the test... Then it happens: one of the simulated users logs an error stating that it has timed out. more

EFF Announced New Service to Let You Know When Terms-of-Serivce of Popular Sites Change

The Electronic Frontier Foundation (EFF) has launched a new site to keep track of 'Terms of Service' for major websites such as Google, Facebook, eBay and others. The new website called TOSBack has been created to help users easily find privacy policies of various websites and to alert them when those policies are changed. "Some changes to terms of service are good for consumers, and some are bad," says EFF Senior Staff Attorney Fred von Lohmann. "But Internet users are increasingly trusting websites with everything from their photos to their 'friends lists' to their calendar -- and sometimes even their medical information. TOSBack will help consumers flag changes in the websites they use every day and trust with their personal information." more

Can a CDN Help Website and Application Performance?

Before we answer the question, "Can a CDN help your website and application performance," let's take a moment for a short CDN 101. A CDN (content delivery or content distribution network) is a system of computers placed at different network nodes to provide the same content from the shortest distance possible. In other words, a CDN attempts to take pieces of content from your website and pass it to various nodes around the Internet. more

Google Releases a One-Stop Reference Source to Browser Security

Today via its Online Security Blog, Google announced the release of its Browser Security Handbook aimed at providing web application developers, browser engineers, and information security researchers a "one-stop reference" to critical security attributes of modern web browsers. "Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities," says the introduction to the 60-page document. more