Related Content
Today’s Smart Pet Trackers Have GPS, Bluetooth, and More Today’s smart pet trackers are so much more than a homing beacon for your dog or cat. They’re Bluetooth-enabled and use GPS technology, and some even act as a fitness tracker. If you’re worried about your pet escaping—and wouldn't mind some bells and whistles—these devices can bring you some peace of mind. |
||
Georgia Tech IoT Study: Takeaways for Smart Cities The internet of things has sky-high expectations, and smart cities, where devices connect across public and private sectors, is one of the drivers fueling the fervor. But there are also skeptics saying the IoT is slow to materialize, which poses questions about risks surrounding cyber security and privacy. |
||
Microsoft Calls for Federal Regulation of Facial Recognition Microsoft has called for federal regulation of facial-recognition software, arguing that such artificial intelligence abilities are too significant and potentially dangerous for its purveyors to police themselves. The move comes amid public criticism of several tech giants over their use—and misuse—of the technology. |
||
5 Myths about API Security APIs are designed to provide interfaces between multiple applications, allowing them to work together. From a security perspective, this is a powerful tool to have. Unfortunately, the effectiveness of APIs diminishes if they are misunderstood. Here are five common myths about API security, along with the facts. |
||
FDA Reviewing Guidelines for AI and Health Care Artificial intelligence is projected to revolutionize health care and make high-quality medical treatment more accessible and affordable. While 3D-printed donor organs may still be on the horizon, AI tools to detect strokes, diagnose diabetic retinopathy, and help identify wrist fractures are already here. |
||
The Cross-Browser Testing Landscape Is Ready for DevOps While most websites today are responsive, there is a significant growth in progressive web apps that provide cross-platform mobile and web capabilities from within a web app. Add to this maturing practices around agile development and testing and greater adoption of BDD practices, and the landscape is ready for DevOps. |
||
A Definition of Done for DevSecOps In DevOps, we have a software delivery pipeline that checks, deploys, and tests every build. The goal is to produce a viable candidate for production, so we have to look at many different aspects of quality, including security. To be sure we hit all the crucial marks, we should have a definition of done for DevSecOps. |
||
6 Ways to Protect Your Organization from DDoS Attacks During a DDoS attack, no one can use your application, which will result in loss of business. Brand reputation also tumbles if customers can't access your site or become casualties of the data breaches. However, there are some proven practices for preventing DDoS attacks—and for what to do if you fall victim to one. |