Longtime ServiceNow partners Cloud Sherpas and Fruition Partners are leading the inaugural wave of applications.
Showing results 1 to 20 of 2,877
Microsoft's Service Fabric will target first ISVs and startups building public cloud applications, and later come to Windows Server and Linux.
Verizon's new Data Breach Investigations Report 2015 says malware isn't a mobile epidemic, that breach costs are variable, and that the industry doesn't understand its adversaries.
VCE believes that the adoption of a hybrid cloud strategy is practical for enterprises, as it gives them the choice of where to place their applications.
IBM and Fujifilm are now able to pack 220 TB of data on a tape cartridge. IBM is arguing that tape is a strong backup option for cloud applications.
The networking giant has a number of new tricks up its sleeves to tackle the spread of malicious activity, including the long-promised integration of ThreatGrid.
As companies look to move their core business applications to the cloud, smaller, more specialized industry cloud providers have a chance to be the new heroes of business tech.
Zero Day Weekly: Cyber national emergency, GitHub and Slack nailed, Android malware less than 1 percent
A collection of notable security news items for the week ending April 3, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Windows malware combined with social engineering attacks are raiding enterprise bank accounts for over a million dollars a hit.
The emergence and popularity of cloud technology has led many companies to develop industry-specific cloud applications. Here are the vertical clouds that are drawing the biggest VC investments.
Symantec says a new Trojan-based campaign, focused on the Middle East, is targeting the energy industry and its trade secrets.
Online screenshot-sharing service Puush is warning its users to change their passwords after it emerged that the platform had been infected with malware.
A collection of notable security news items for the week ending March 26, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Users were warned not to restart their PCs, in case they wouldn't boot up again.
After admitting to a security breach, the luxury hotel chain has managed to remove malware discovered on systems related to customer financial data.
AdaptiveMobile has uncovered a new mobile malware campaign which uses phone contacts to spread.
Sponsored by Red Hat and Intel
Back in 2011, network architects at the NASA Center for Climate Simulation began investigating the viability of running the organisation's modelling and simulation applications on cloud infrastructure as an alternative to its purpose-built computing cluster named Discover.
Twilio will use Authy's API to offer embeddable two-factor authentication and phone verification to applications running Twilio's cloud-based communications services.
Google's new Cloud Security Scanner allows users to easily scan applications for two common vulnerabilities: cross-site scripting, and mixed content.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 34 ways to improve your iPhone's battery life
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 So you have an app idea and want to make a bajillion bucks
- 5 ZDNet Cloud TV: Impact of cloud on HR (highlights)