General

Last Updated on 13 Jan. 2015, Total: 156 Blog Posts

  1. EU lacks the tech workforce

    Half of Europe's workforce is too tech-challenged to fill all the extra ICT jobs that will be knocking around in the next few years, according to the European Commission (EC). The EC's Digital Agenda crew released its scoreboard of how well the continent is doing. The overall aim of the EC Digital Agenda is to deliver sustainable economic and social... Read More

  2. System Update Readiness Tool for Windows 7and Windows Server 2008 R2

    Check out this free tool provided by Microsoft which was released to fix an inconsistency in the Windows servicing store which may prevent the successful installation of future updates, service packs, and software. This tool checks your computer for such inconsistencies and tries to resolve issues if found. This tool is for Windows Vista, Windows Server 2008, Windows Server 2008... Read More

  3. Be aware of fake Google’s Chrome installers for Windows

    Trend Micro, the antivirus vendor has identified suspicious URLs which appear to be hosted on legitimate sources such as, Facebook and Google domains that promote a malicious file called ChromeSetup.exe. This file has nothing to do with Google's Chrome installation but is simply an information-stealing Trojan application and is offered for download on various websites! An analysis of the file... Read More

  4. Submarine cables – Internet’s physical infrastructure

    If you're into the physical infrastructure of the Internet then this map should be your starting point. The Submarine Cable Map is a free resource from TeleGeography. Data contained in this map is drawn from Global Bandwidth Research Service and is updated on a regular basis. The map is rich of information including cable capacity, provider name and other elements;... Read More

  5. Intellectual Property Watchlist 2012

    Consumers International, an independent global campaigning voice for consumers has published its fourth annual IP Watchlist. CI looks towards a future in which creators and consumers support each other in a mutually beneficial ecosystem of content production, consumption and reuse. The report also states that the recent discontent caused by ACTA and SOPA could have been avoided if government policy-makers... Read More

  6. 16-bit legacy applications & Windows XP Mode

    Although, 16-bit legacy applications may have become something of the past there are still instances of these applications which are considered as critical to some businesses. In fact, last week during a conference I met an IT Manager who said that they still use a 16-bit finance package which was developed for the specific needs of the organization. Although, the... Read More

  7. Online Email Privacy Tester

    Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More

  8. Why Can My Devices Be Searched at the Border?

    The U.S. Constitution prevents the government from performing searches without a valid reason; the government generally can't snoop through your laptop for no reason. Electronic data stored on personal devices is a reflection of our lives - family photos, medical documents, banking information, details about what websites we visit, and so much more. But those privacy protections don't safeguard travelers... Read More

  9. Passwords are not the bottleneck

    Passwords were and remain an important aspect of security in the financial sector, however, when you reflect on the whole scenario of financial mechanisms you might be surprised to find out that the impact of stolen passwords or compromised credentials is quite low in terms of financial losses. In fact, two researchers from Microsoft published a stimulating paper about this... Read More

  10. Microsoft security updates for April 2012

    If you do not have automatic updating turned on, or to check whether you need an update, go to Windows Update by clicking the Start button, All Programs, and then click Windows Update. In addition you can go to Microsoft Update. Microsoft Update is an online tool that will scan your computer and provide you a report about what updates... Read More

Featured Links