News

Last Updated on 20 Oct. 2014, Total: 181 Blog Posts

  1. Mozilla smartphone OS

    The Mozilla Foundation makers of the Firefox web browser will be releasing an operating system for mobile phones later on this year. The first handsets running Mozilla's "Boot to Gecko" (B2G) software will be available in Brazil on Telefonica Vivo's mobile network. Gary Kovacs, chief executive of Mozilla, said this openness would make a difference to the way applications on... Read More

  2. Dell to acquire Wyse Technology

    Dell will be acquiring the cloud-computing software provider Wyse Technology. Dell will expand its desktop virtualization capabilities and provide new market opportunities for the full range of its enterprise solutions and services. "Desktop virtualization can help organizations streamline IT management, improve productivity and security, and increase cost efficiency for discrete workloads or usage scenarios. The Wyse Technology desktop virtualization capability... Read More

  3. Next-Generation Security for Services Running On Connected Devices

    ARM Holdings, the leading semiconductor intellectual property (IP) supplier will be leading a joint venture to produce a common security standard for connected devices such as tablets, smart-TVs, games consoles and smartphones. Together with security technology companies, Gemalto a world leader in digital security, and Giesecke & Devrient a leading international technology provider, they will be creating a common security... Read More

  4. The end of Symantec and Huawei Technologies joint venture!

    The deal that took off four years ago between Symantec and the Chinese company Huawei, to develop computer network security products came to an end as the US government effort to enhance cyber security is producing both direct and indirect benefits! Symantec is a global leader in security, storage and systems management solutions and Huawei is a leading global information... Read More

  5. Enemies of the Internet!

    Who are the enemies of the Internet? Governments like China, Vietnam and Iran that hold the largest number of cyber-citizens or netizens in jail. The latest countries to join the annual list are Bahrain and Belarus – these governments restrict Internet access, filter content and imprison bloggers. On the other hand, governments that try to introduce mandatory web filtering mechanisms... Read More

  6. Michael Jackson entire catalog…

    Michael Jackson's entire 50,000-track catalog which includes many songs that have never been released may have been compromised in last year's Sony hack! It is reported that hackers were able to download the entire catalog! In fact, Sony admits the breach and stated that all compromised servers have been patched. Sony purchased the catalog back in 2001 for $250 million!... Read More

  7. Bilingual avatars developed by Microsoft

    Microsoft Research presents bilingual avatars at the TechFest 2012. The Monolingual TTS can translate the user's speech into another language and in a voice that sounds like the original user's. Imagine, the tool recognizes your native tongue, translates it to a different language, and plays it with a great deal of approximation of what you sound like! The demo at... Read More

  8. Apple's iPad sales beat HP's PC sales

    According to All Things Digital, Gartner's report reveals that Apple sold more iPads than Hewlett-Packard sold personal computer in the last quarter! 'Apple's total sales of 20M "personal computing devices" far outstripped HP's estimated PC sales of 14.7M in the same time frame'. I would want to see a comparison between the sales figures of total tablets against total PCs... Read More

  9. Dell launches its next generation servers

    Dell announced a full portfolio of 12th Generation blade, rack and tower PowerEdge servers optimized to run mission-critical business applications. Dell designed and built its 12th Generation servers with input from more than 7,700 customer conversations in 17 countries across four continents – focusing on their needs for innovation to deliver business results faster. The new Dell PowerEdge servers work... Read More

  10. No botnet required for low-tech theft

    Pay attention where you leave your security blueprints as these may end up stolen at some train station! Actually, this has happened to a French defence contractor who was carrying blueprints of a drone aircraft being developed jointly by France and United Kingdom. No informatics strategies or high-tech tools were used in this incident! Read the full story here -... Read More

Featured Links