- Public sector fails to tackle £20.6bn a year fraud using big data
- Cybercriminals have access to 100 zero-day flaws on any day, NSS Labs calculates
- Natwest website targeted in DDOS cyber attack
- DARPA makes finding software vulnerabilities fun
- Flashlight app vendor settles with FTC over privacy violations
Amazon's ambitious plan to use flying drones to deliver packages is far-fetched, but not just because of technology limitations or air traffic regulations. Amazon's fulfillment center network, as it stands now, is too limited to serve even a tiny fraction of the U.S. in the method described by CEO Jeff Bezos.
Amazon Web Services this week rolled out a new cloud-based data analytics tool named Kenesis, which can analyze massive amounts of data in real time and be paid for by the hour.
Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.
It wouldn't be a mischaracterization to equate the cloud computing industry to the wild, wild west.
If the iPad doesn't succeed as a consumer electronics device--its initial target market--it may find a successful second career as an electronic textbook reader.
Amazon's extending its electronic bookstore onto your desktop. The company announced plans for a Kindle for PC desktop application at Microsoft's Windows 7 launch event Thursday.
There's been a lot of discussion the past couple of days about an analysis by Guy Rosen, in which he estimates that Amazon Web Services (AWS) is provisioning 50K EC2 server instances per day. He created this estimate by examining EC2 resource IDs and doing a time-series analysis on how much the IDs are incremented per hour.
E-books may have been a niche technology so far, but Google Inc.'s entry into the market could burst the online business wide open.
At one point, it seemed that phishing was receding to the status of a minor issue threatening only naïve consumers. However new cybercriminals and phishing techniques have lead this to become a greater concern. Download how to find out how phishing became the No. 1 web threat, and which web security solution can best protect your company.
CDex can extract the data directly (digital) from an Audio CD, which is generally called a CD Ripper or a CDDA utility.
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Distracted consumers spend less time on social than email marketing: Report
- New report busts myths about millennials and their digital and social behaviour
- Twitter gobbles up more cookies with retargeted ads, says users have privacy choices
- How to start the journey towards customer-centricity
- Gaining efficiency around search-based marketing: REA Group's keyword quest