article thumbnail

How Far has Face-Tracking Technology Come in 2016?

CTOvision

This is the technology behind Snapchat’s filters, impressive on mobile hardware, and it points to the most promising aspect of face-tracking technology: its implications for socializing in the digital sphere. Where do you think face-tracking technology will go towards the end of 2016? Leave a comment below!

Social 150
article thumbnail

Why security services are an emerging sweet spot for telcos

TM Forum

Security, especially cybersecurity, is a growing challenge for all enterprises as they accelerate digitization of their networks, operations and relationships with customers. Based on our research, we estimate that revenue for security services grew by almost 20% in 2020. Acquiring security expertise. Growing the business.

Security 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The HP-Autonomy lawsuit: Timeline of an M&A disaster

CIO Business Intelligence

Rather than selling software to customers, HP said, Autonomy had been selling them hardware at a loss, then booking the sales as software licensing revenue. March 2010: Apotheker says he wants to transform HP from a hardware producer to a software and services provider. June 2015: Hewlett-Packard Co. 19, 2011, and Nov.

HP 105
article thumbnail

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Nature is now providing engineers with the missing link that can help with the most vexing challenge of our age: enabling both security and functionality in our interconnected IT systems. The escalation of these attacks in 2016 is raising fears that cyberattacks against electoral systems will threaten democracy itself.

Security 150
article thumbnail

TechNet Augusta 2016 “Cyber in the Combined Arms Fight”

CTOvision

The prevailing theme of the presentations and discussions was how to provide secure networks in times of war. Army is seeking ways to securely combine cyber and kinetic effects to achieve military advantages. There will be no US unilateral operations, so secure and interoperable solutions are key. Secure digital fires.

CTO Hire 155
article thumbnail

12 hardware and software vulnerabilities you should address now

Network World

It's not a stretch to say that most organizations have at least some old hardware and software still in use. As BDNA's State of the Enterprise Report (Q2 2016) indicates, many organizations are unaware of the potential liabilities, which can cost millions of dollars in the case of a successful attack after a vulnerability is exploited.

article thumbnail

Microsoft Azure revenue up 30%, with help from AI, as tech giant beats overall expectations

GeekWire

This includes sales of the company’s Surface laptops and tablets and other hardware. billion, the highest total in any quarter since Microsoft acquired the business social network for $26 billion in 2016. Nadella did not disclose revenue from security products as he has before at this time of year. Devices revenue was $1.3

Microsoft 121