Focus
Security
Some HP laptops users came with a preinstalled program to capture the keystrokes of users, a security researcher recently discovered. The researcher, Michael Myng aka "ZwClose," discovered the keylogg...
  • Many federal government IT managers used to be wary of the shortcomings of migrating to cloud technology because of potential data security problems affecting email, business systems, personal data re...
  • As powerful men drop like flies due to their inability to resist abusing their authority, it's clear that the problem is widespread. Similarly, it's likely that we'll find the problem of alleged indus...
  • A method for scrambling data to protect it from the super powerful computers of the future has received a speed boost from a team of researchers from Duke and Ohio State universities and the Oak Ridge...
  • A popular technique used by website operators to observe the keystrokes, mouse movements and scrolling behavior of visitors on Web pages is fraught with risk. The technique offered by a number of serv...
Cloud
CoreOS on Tuesday announced the release of Tectonic 1.8, a Kubernetes container management platform. Tectonic enables enterprises to deploy key automation infrastructure components that function like...
  • Configure, Price, Quote systems have a name problem. When they debuted, their basic functions gave a name to the category that was self-explanatory, and it fit well. As with any good idea in technolog...
  • Apple has released a security update to fix a serious flaw revealed via Twitter. The patch is available for macOS High Sierra 10.13.1. macOS 10.12.6 and earlier versions aren't affected. "This morning...
  • Oracle earlier this week announced the availability of its Exadata platform on its next-generation cloud infrastructure, which essentially means the company is providing Exadata as a Service. The Orac...
  • We've seen a parade of technologies coming into the front office since 2000, including browser-based cloud computing, social media, mobile technology, workflow, journey mapping, and big data and analy...
Hot recommend
WPA2 Flaw Could Blow WiFi Systems Wi...
Report: Russian Hackers Penetrated E...
Report: Cybersecurity Dangerously La...
Small Companies Often in the Dark Ab...
RoboCyberWall Aims to Block Linux Se...
Android Devs May Follow Apple's Fac...
Tiny Core: Small Footprint, Big Pote...
Kolab Now Is a Smooth On-Ramp for Li...
Absolute Linux Caters to the Slackwa...
Amazon's Alexa Goes to Work in 2 Ne...
Apple
Reviews
Top