Bots stories - Page 5
From Vietnam without love: Asia Pacific's next cyber attack hub
Wed, 14th Feb 2018
#
crypto
#
blockchain
#
cybersecurity
Vietnam may be called the next Silicon Valley for its technology prowess, but for the first time it is now one of the top five cyber attack sources.
The new normal: Robots, hyper-collaboration and smart meetings
Fri, 12th Jan 2018
#
uc
#
hybrid & remote work
#
cloud services
With 75% of employees using collaboration tech, Polycom's research forecasts an exponential growth in smart meetings, cloud integration, and AI-driven tools.
The power of people in today's digital-service economy
Fri, 17th Nov 2017
#
data analytics
#
martech
#
planning
Jeff Arnold, Unit4 ANZ sales director examines how businesses can proactively manage their workforce by adopting technology to increase efficiency.
Exclusive: Amazon bringing massive CX opportunities for local channel
Mon, 13th Nov 2017
#
crm
#
uc
#
data analytics
Amazon is coming – and it's bringing with it a 'massive' opportunity for the local IT reseller community, Frost & Sullivan says.
Arbor Networks digs deep into the Lazarus Group's DDoS attacks
Mon, 19th Jun 2017
#
ddos
#
cybersecurity
#
arbor networks
It is not clear whether the IPs listed in the report were part of a command and control infrastructure or simply bots - or both.
EXCLUSIVE: Trends in the UC industry and how resellers can capitalise on them
Mon, 8th May 2017
#
uc
#
martech
#
ai
Recently we spoke with tech stalwart Randy McGraw on trends in the unified communications industry and just how the channel can capitalise on them.
Are chatbots just a fad? One app developer shares his thoughts
Mon, 10th Oct 2016
#
uc
#
martech
#
ai
Based on a computer program that mimics conversations with people using artificial intelligence, chatbots can transform the way people interact.
Lifting the lid on major enterprise security threats
Thu, 4th Jun 2015
#
malware
#
firewalls
#
network security
Today's cybercriminals are sophisticated and ruthless: they prey on the weaknesses in a network, approaching any security layer as an open invitation.