England and Wales Cricket Board signs deal with BridgeHead

BridgeHead’s Independent Clinical Archive, HealthStoretrade;, selected to store, protect and share players’ medical imagesASHTEAD, UK – 23 May 2018 – The England and Wales Cricket Board (ECB), the national governing body for al...

Panaya Recognized for Value Stream Management Solution

Elevate Agile-Plus-DevOps With Value Stream Management report outlines the benefits offered by the modern Application Lifecycle Management solutionHackensack, NJ – May 23, 2018 – Panaya, the leader in SaaS-based testing and continuous deliv...

DETEC intelligent document composition software boosts security, efficiency and compliance with...

Groß-Gerau, Germany, May 23, 2018 – DETEC, a division of UNICOM Global, which provides software solutions for document-based corporate communications, has announced the immediate availability of DoXite 2.4.

This is the latest version of DETECamp;#82...

Dell XPS 15 2-in-1 review: Meet the child of Intel and...

A chipset that combines Intel's CPU with AMD's GPU makes the XPS 15 thinner.

Small, nimble, quick, and loud: The BMW X2 reviewed

We put the new-for-2018 BMW X2 subcompact crossover through its paces.

New DataRobot EU Cloud Accelerates the Creation of AI-Driven Enterprises Across...

New Ireland-Hosted Cloud Platform Supports Unique Needs of EU Customers and Upcoming GDPR RequirementsLondon – May 23, 2018 – DataRobot, a pioneer in automated machine learning, announced today the release of a new version of the DataRobot ...

Backdoors in D-Link’s backyard

If you want to make the world safer, start with the smart things in your home. Or, to be more specific, start with your router – the core of any home network as well as an interesting research object.

And that router you got from your ISP as part of your internet contract is even more interesting when it comes to research.

Spam and phishing in Q1 2018

The quarter's main topic, one that we will likely return to many times this year, is personal data.
It remains one of the most sought-after wares in the world of information technology for app and service developers, owners of various agencies, and, of course, cybercriminals. Unfortunately, many users still fail to grasp the need to protect their personal information and donrsquo;t pay attention to who and how their data is transferred in social media.

6 must-have web frameworks for the Google Go language

The Google Go language (aka Golang) has become a strong choice for writing web services and APIs.
It compiles to fast-running native code, it has native metaphors for asynchronous programming and other features useful for web services, and it has a bro...

The rise of the Istio service mesh

Diogenes Rettori is the principal product manager for Red Hat OpenShift. The attention and traction generated around the Istio service mesh technology in the past year is certainly intriguing.
In fact, as I write this article, Istio is only at vers...

CleverTouch helps marketers ‘Level Up’ with Marketo and Pardot Certification Program

New comprehensive training initiative provides bespoke Marketing Automation training to guarantee platform certificationAlresford, May 23rd, 2018 – CleverTouch, Europe’s leading Marketing Automation consultancy and service provider, today a...

Industry still struggling to defend against breaches but getting better at...

Skills shortages still pose major risk to long term information security capability23 May 2018: The latest survey from the not-for-profit industry body, the Institute of Information Security Professionals (IISP), shows that over the last three years, t...