Open-source innovations and the Linux operating system continue to set complacency aside. Here's a roundup of the latest developments from the Linux Foundation, Red Hat Enterprise Linux, SoftMaker, and the Google Open Source Security Team...
The U.S. government is moving quickly and aggressively to address cybersecurity vulnerabilities affecting both the federal government and the private sector. Information technology companies that are directly and indirectly involved in providing IT products and services to the federal government wil...
The technology one-upmanship between the United States and China is fast becoming the new space race. There's been a lot of talk in the press about the competition to reach 5G, but little traction outside of the tech community about something more momentous: the dangers of computing in a post-quantu...
The Russian hacking group known for stealing sensitive emails from the Democratic National Committee during the 2016 presidential election season has been cracking into printers, phones and video decoders to gain access to corporate networks, according to Microsoft. The group, known by a number of n...
President Donald Trump has signed an executive order aimed at boosting artificial intelligence R&D in the U.S. The order sets up the American AI Initiative, which instructs federal agencies to move projects involving artificial intelligence to the top of their priority lists. No funding is propo...
Widespread use of unpatched open source code in the most popular Android apps distributed by Google Play has caused significant security vulnerabilities, suggests an American Consumer Institute report. Thirty-two percent -- or 105 apps out of 330 of the most popular apps in 16 categories sampled -- ...
One of the few policies that President Donald Trump's administration has carried over from his predecessor is that the federal government needs to make vast information technology performance upgrades -- especially to cloud-based platforms. That should comfort vendors seeking business in the federal...
Federal agencies already under the gun to modernize their information technology capabilities have a new set of standards to meet as a result of an executive order President Donald Trump issued this spring. The directive not only will affect agency managers in their IT operations and acquisition act...
A major federal acquisition opportunity with a potential contract value of $50 billion for information technology vendors is back on track. The General Services Administration recently resumed processing vendor applications after a legal challenge to the contract was resolved in its favor. As a resu...
Ransomware has become a gold mine for digital criminals. In the first three months of this year, electronic extortionists squeezed $209 million from victims desperate to recover their data after it was scrambled by the malicious software, based on FBI estimates. At that rate, ransomware could funnel...
Google last week announced an experiment with post-quantum cryptography in Chrome. A small fraction of connections between Google's servers and Chrome on the desktop will use a post-quantum key-exchange algorithm in addition to the elliptic-curve key-exchange algorithm already being used. The idea i...
The U.S. government is picking up the pace in its efforts to use open source software as much as possible. Federal CIO Tony Scott last month released details of a proposed policy designed to allow customized software created for one agency to be openly available to other agencies as well. Industry a...
Apple last week filed a motion to vacate a federal order requiring the company to create a tool or code to unlock the iPhone of one of the San Bernardino, California, shooters. The order would set a dangerous precedent and release a powerful means to breach security on potentially millions of phones...
U.S. government agencies have spent more on cloud configurations than official budgets have predicted -- and those agencies will pick up the pace of cloud spending over the next five years. Federal agencies will significantly boost spending on cloud deployments with various "as a service" configurat...
Zerodium has posted a million-dollar bounty for juicy iOS 9 bugs or jailbreaks. Zerodium runs a market where exploits and vulnerabilities are bought and sold, according to Damballa. "While there is no insight into a specific buyer, we can assume if an exploit for iOS 9 is found, Zerodium will sell...
Google Meet
Microsoft Teams
RingCentral
Webex by Cisco
Zoom
Something Else
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/08/frustrated-caller.jpg
https://www.crmbuyer.com/story/accent-altering-voice-tech-aims-to-replace-frustration-with-communication-177022.html
Accent Altering Voice Tech Aims To Replace Frustration With Communication
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/01/smartphone-shopping.jpg
https://www.crmbuyer.com/story/messaging-key-to-meeting-changing-cx-preferences-176669.html
Messaging Key To Meeting Changing CX Preferences
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/07/Sweetwater-store-entrance.jpg
https://www.crmbuyer.com/story/sweetwaters-well-tuned-marketing-is-music-to-shoppers-ears-176751.html
Sweetwater’s Well-Tuned Marketing Is Music to Shoppers’ Ears
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/11/mall-shoppers-crowd.jpg
https://www.crmbuyer.com/story/5-types-of-shoppers-and-what-they-want-for-the-holidays-177187.html
5 Types of Shoppers and What They Want for the Holidays
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/09/virtual-try-on.jpg
https://www.crmbuyer.com/story/vr-platforms-deliver-metaverse-style-experiences-to-online-shopping-176865.html
VR Platforms Deliver Metaverse-Style Experiences to Online Shopping
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/03/customer-data-analysis.jpg
https://www.crmbuyer.com/story/for-better-crm-results-prioritize-pipeline-over-forecast-176709.html
For Better CRM Results, Prioritize Pipeline Over Forecast
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/12/holiday-gift-card.jpg
https://www.crmbuyer.com/story/why-quality-e-gifts-are-smart-business-decisions-177207.html
Why Quality E-Gifts Are Smart Business Decisions
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/08/handwrytten.jpg
https://www.crmbuyer.com/story/robotic-letter-writing-lends-a-hand-to-personalized-marketing-crm-176595.html
Robotic Letter Writing Lends a Hand to Personalized Marketing, CRM
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/11/crm-gears.jpg
https://www.crmbuyer.com/story/retail-needs-tech-integration-strategies-to-satisfy-consumer-expectations-177137.html
Retail Needs Tech Integration Strategies To Satisfy Consumer Expectations
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/11/online-shopping-young-lady.jpg
https://www.crmbuyer.com/story/retail-reality-check-rewards-programs-do-matter-to-consumers-177090.html
Retail Reality Check: Rewards Programs Do Matter to Consumers
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/02/businessman-thinking.jpg
https://www.crmbuyer.com/story/cloudworld-reevaluated-176705.html
CloudWorld Reevaluated
Enter your Username and Password to sign in.
Social CRM
See all Social CRM