General

Last Updated on 30 June 2015, Total: 162 Blog Posts

  1. Last chance to win a Pluralsight Annual Plus subscription!

    Until the end of June 2015 we will be conducting a site survey to help us learn more about our visitors and what you'd like to see on the site in the future... Read More

  2. Cloud Hosting Explained: Infographic

    What is Cloud Hosting? Guest post and infographic provided by SingleHop... Read More

  3. An Examination of the Cybersecurity Labor Mark

    The not-for-profit institution RAND carried out a study about the current status of the labor market for cybersecurity professionals... Read More

  4. Operation WOOLEN-GOLDFISH

    State-sponsored cyberwarfare is no different than physical battles or terrorist attacks in terms of scope and damage. The Rocket Kitten group used spear-phishing emails in order to penetrate their target systems... Read More

  5. March Fav Links

    Exclusive: Google is working on a new VPN service for use on open WiFi networks... Read More

  6. The 20 percent of Outlook features that produce 80 percent of your desired results

    The Ultimate Help Guide to Using Outlook - Streamline Tasks, Boost Productivity and Get Ahead... Read More

  7. Q&A with Unitrends CEO Kevin Weiss

    Kevin Weiss is Unitrends new president and chief executive officer (CEO). Weiss talks about his skills and his vision on how to turn Unitrends into a market leader for data protection solutions... Read More

  8. Google’s rendering-based indexing best practices

    Google’s Webmaster Guidelines update for optimal indexing in view of the recently announced change of rendering web pages more like a typical modern browser rather than as a text-only browser... Read More

  9. "Body recognition" compares with fingerprint ID

    A range of human anatomical features and body measurements can help to identify a person, such as from closed circuit television (CCTV) security videos, no matter what clothing the person may be wearing... Read More

  10. What does a mobile devices manufacturer know about its customers?

    Nowadays every electronic device can potentially steal our data and send it to some company in another part of the world, in absolute silence... Read More

Featured Links