- Transform IT security process into business action, CSOs advise
- In Pictures: The biggest Internet security challenges of 2013
- Disqus scrambles after leak fuels Swedish tabloid exposé
- Identity-theft vulnerability fixed in Microsoft Office 365, says security firm
- Microsoft Patch Tuesday reinforces the value of software upgrades
- Amazon drones are 'fantasy,' says eBay CEO
- On snooping disclosures, AT&T and Internet companies are like night and day
- In his own words: Tony Abbott on the NBN
- TPG buys AAPT
- US faces major Internet image problem, former gov't official says
The U.S. Defense Department may have found a new way to scan millions of lines of software code for vulnerabilities, namely by turning the practice into a set of video games and puzzles and have volunteers do the work.
The Space X Falcon 9 rocket appears to have passed an important step, with the launch of a telecommunications satellite into geostationary transfer orbit.
Amazon.com plans to deliver packages to customers using unmanned aerial vehicles in 30 minutes or less.
Controversial quantum device maker D-Wave is hoping to find a home for its cutting-edge technology in the high-performance computing (HPC) market.
With memory, as with real estate, location matters. A group of researchers from Advanced Micro Devices (AMD) and the Department of Energy's Los Alamos National Laboratory have found that the altitude at which SRAM (static random access memory) resides can influence how many random errors the memory produces.
Amazon's ambitious plan to use flying drones to deliver packages is far-fetched, but not just because of technology limitations or air traffic regulations. Amazon's fulfillment center network, as it stands now, is too limited to serve even a tiny fraction of the U.S. in the method described by CEO Jeff Bezos.
Bob Metcalfe, Dave Boggs and the rest of the scientists at Xerox Palo Alto Research Center in 1973 were a lot like young developers at a Silicon Valley startup today.
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
Students at a U.S. military graduate school in California are mining social media with new methods that may change the way the armed forces collect intelligence overseas.
Aware of a history of heart disease in his family, then-50-year-old Gary F. Thompson saw his doctor for a checkup before he ran a Los Angeles marathon in the mid-1990s.
In a head to head comparison of 8 end-point security products, we look at which performs the best across crucial performance metrics - from installation time to memory usage. Download to find out which performs the best!
HandBrake is an opensource tool that allows you to backup your DVDs so that you can store and watch them on your computer. Features include: ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Facebook performance report signals rising brand engagement on social
- Australia's love of online search advertising continues, finds new report
- Why Shazam is helping advertisers hit the right tune with consumers
- Twitter, the protector of news?
- B2B customers are increasingly led by consumer habits and experience