The third annual CNME ICT Achievement Awards were held last night to honour the achievements of the major players from industry within the Middle East. The ceremony, held at Jumeirah Emirates Towers, capped off the opening day of GITEX, ...
Tags: ICT Achievement, GITEX, Hardware, ICT
An official document containing policies and pledges for customers of Oracle's cloud services reveals that many aspects fall in line with industry standards, while others may prompt cause for worry among customers, according to analysts. ...
Tags: Computer Products, Oracle Cloud, industry standards, monitoring tools
Contrary to most reports, Apple is not yet the most valuable company of all time, according to calculations made by the Columbia Journalism Review (CJR). The publication, operated by the Columbia School of Journalism, called out multiple ...
Tags: Apple, aluable company, CJR, Press Watchdog
A novel technique based on MapReduce could let hackers hijack computing resources used by cloud-based mobile browsers and use them anonymously, according to security researchers from North Carolina State University and the University of ...
Tags: cloud computing, Mobile browser hack, mobile device threat, smartphone
This is especially true of organizations subject to compliance with regulations like PCI-DSS or HIPAA, but any organization could find itself in trouble if it can't get its hands on emails and SMS messages during an ediscovery process. ...
Tags: IT, HIPAA, forensic investigations, mobile devices
The British Fashion Council(BFC)unveiled the London Fashion Week creative for AW13.In collaboration with Manolo Blahnik CBE,the recipient of the Outstanding Achievement at this year's British Fashion Awards,he has created the exclusive ...
Tags: Manolo Designs, London Fashion Week, Exclusive Imagery
An application privacy report by Juniper Networks’ Mobile Threat Center (MTC) indicates that permissions and capabilities in apps could expose sensitive and personal data in mobile devices. A wider group of application developers ...
Tags: Juniper, mobile device, personal data, sensitive data, smartphone
Several malicious Android apps designed to steal mobile transaction authentication numbers (mTANs) sent by banks to their customers over SMS (Short Message Service) were found on Google Play by researchers from antivirus vendor Kaspersky ...
Tags: Computer Products, Apps, SMS, Google Play
FieldOne Systems, a leading provider of field service software solutions, announced today a major update for the mobile component of its Terra solution. Terra Mobile 2.0 includes new features that will dramatically improve how FieldOne ...
Tags: software solution, Terra solution, scheduling capabilities
In Star Trek: The Motion Picture, the humanoid crew members of the Enterprise wore little boxes near the waistlines of their pajama-like uniforms. While their purpose wasn't explained in the film's dialogue, these were supposed to be ...
Tags: medical telemetry devices, cell phones, computers, Prognosis, medical apps
Microsoft concluded its global release tour of Windows 8 last night in front of a packed out crowd in Dubai. The company showcased its latest innovation in stylish fashion from inside the Burj Khalifa. Antoine Leblond, Corporate Vice ...
Tags: Dubai, Microsoft, Surface release, tablet, Windows 8, Windows
From the moment he walked in the door at BancVue in December 2010, Sunny Nair knew he wanted to move the financial services software company from Microsoft's Hyper-V to VMware's virtualization technology. The company was having trouble ...
Tags: Microsoft, VMware, virtualization technology, financial firms
Playing at an online casino has become one of the most popular activities to do online, in fact more players gamble online than at the actual land based casinos. This rise in popularity is due to the ease of just logging on to your pc and ...
Tags: online casino, online game, online bingo, game software
When malware infects a machine it usually goes after the system software. But in a rare case worked on by SpiderLabs, researchers found a Trojan that had been infected by a virus, leaving both still functioning as normal. The two pieces ...
Tags: malware, system software, SpiderLabs, Trojan, virus
When users install Google Maps on their iPhone, the option to share location data with Google is switched on by default. By doing this, Google violates European data protection law, according to a German data protection watchdog. Google ...
Tags: Google Maps, Computer Products, Iphone, German Watchdog