General

Last Updated on 23 June 2014, Total: 152 Blog Posts

  1. Intellectual Property Watchlist 2012

    Consumers International, an independent global campaigning voice for consumers has published its fourth annual IP Watchlist. CI looks towards a future in which creators and consumers support each other in a mutually beneficial ecosystem of content production, consumption and reuse. The report also states that the recent discontent caused by ACTA and SOPA could have been avoided if government policy-makers... Read More

  2. 16-bit legacy applications & Windows XP Mode

    Although, 16-bit legacy applications may have become something of the past there are still instances of these applications which are considered as critical to some businesses. In fact, last week during a conference I met an IT Manager who said that they still use a 16-bit finance package which was developed for the specific needs of the organization. Although, the... Read More

  3. Online Email Privacy Tester

    Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More

  4. Why Can My Devices Be Searched at the Border?

    The U.S. Constitution prevents the government from performing searches without a valid reason; the government generally can't snoop through your laptop for no reason. Electronic data stored on personal devices is a reflection of our lives - family photos, medical documents, banking information, details about what websites we visit, and so much more. But those privacy protections don't safeguard travelers... Read More

  5. Passwords are not the bottleneck

    Passwords were and remain an important aspect of security in the financial sector, however, when you reflect on the whole scenario of financial mechanisms you might be surprised to find out that the impact of stolen passwords or compromised credentials is quite low in terms of financial losses. In fact, two researchers from Microsoft published a stimulating paper about this... Read More

  6. Microsoft security updates for April 2012

    If you do not have automatic updating turned on, or to check whether you need an update, go to Windows Update by clicking the Start button, All Programs, and then click Windows Update. In addition you can go to Microsoft Update. Microsoft Update is an online tool that will scan your computer and provide you a report about what updates... Read More

  7. Cellphones That Can See Through Walls

    Researchers at the University of Texas in Dallas have designed an imager chip that could turn mobile phones into devices that can see through walls, wood, plastics, paper and other objects. The team's research linked two scientific advances. One involves tapping into an unused range in the electromagnetic spectrum. The other is a new microchip technology. Read more here -... Read More

  8. The AWS ecosystem!

    Amazon's Web Services (AWS) announced the Public Beta launch of the new AWS Partner Network (APN). This new global program is focused on providing members of the AWS partner ecosystem with the technical information, and sales and marketing support they need to accelerate their AWS-based businesses. APN membership is available for both Technology-based partners and Consulting-based partners. Read more here... Read More

  9. Let your hands speak!

    A new technology developed by researchers at the University of British Columbia could help people who are unable to verbally speak! These researchers have developed a voice synthesizer that allows people to speak by simply moving their hands. The technology known as the Digital Ventriloquist Actor (DiVA) uses a pair of special gloves equipped with 3D sensors that use gestures... Read More

  10. Develop your first Tizen application!

    Tizen is an open source software platform supported by leading mobile operators, device manufacturers, and silicon suppliers for multiple device categories, including smartphones, tablets, netbooks, in-vehicle infotainment devices, smart TVs, and more. Tizen will offer an innovative operating system, applications, and a user experience that consumers can take from device to device. The Tizen platform works on the Linux kernel... Read More

Featured Links