Most UK website users are choosing to allow the use of third-party advertising cookies, according to analysis of the impact of the so-called "cookie law". The UK regulation on the use of cookies, or small files containing browser ...
Tags: UK, Cookies, Website Users, Computer Products
According to the data provided by the Turkish Statistical Institute(TUIK),in October this year Turkey's coking coal imports rose 31.7 percent compared to the previous month and were up 34 percent compared to October 2011,totaling 2.7 ...
Tags: TUIK, Turkey, coking coal imports, energy, coking coal
X-IO is set to launch a new product in its Hyper ISE 7-series hybrid flash/HDD array line, the 740, which will double existing SSD capacity from 1.6TB to 3.2TB. The new product, revealed to Computer Weekly at SNW Europe, aims to fulfil ...
Tags: X IO, Computer Products, SSD capacity, Hyper ISE arrays
Citrix has bought mobile device management (MDM) company Zenprise in an attempt to boost its mobile capabilities. The price Citrix paid for Zenprise has not been disclosed, but sources suggest Citrix could have offered up to $50m for ...
Tags: Citrix, mobile device management, Zenprise, mobile capabilities
Giving customers an element of control when it comes to storing their data in the cloud is the key to gaining their trust and, in turn, their patronage. This is the belief of Trend Micro’s solutions architect, Udo Schneider, who ...
Tags: Trend Micro, Encryption, cloud security, Computer Products
The European Union is moving to build a high-performance computing industry to challenge U.S. dominance, but it doesn't want to play catch-up. It wants to leapfrog and it is seeing whether ARM Holdings technology can give it that edge. ...
Tags: European Union, ARM Holdings technology, ARM Chips, Supercomputing Edge
Innovation through 4G LTE 4G LTE increases mobile productivity Cutting costs with 4G LTE network communications Other findings from EE's 4G LTE survey A global survey of the business benefits of 4G LTE has revealed improvements to ...
Tags: 4G LTE, Business, Computer Products
Virtual Instruments is opening an office in London’s Tech City hub to develop new products and revamp old ones. The building on Rivington Street will initially house 20 software developers, with a further 10 being added by the end ...
Tags: Virtual Instruments, development office, Tech City, Computer Products
The revenues are expected register a 4.1%compound annual growth rate(CAGR)from 2011-2016 Worldwide semiconductor revenue is expected to reach$319bn by 2013,rising a 4.9%compared to$304bn in 2012,according to a report by the International ...
Tags: Semiconductor, Revenue, GAGR, IDC, SAF
IT security budgets are not being used to provide defence technology in some of the areas the enterprise is most likely to need it in, a study has revealed. About 33% of hacker forum discussions are about training and tutorials for data ...
Tags: IT, Hacker, Computer Products, IT Security
The head of the US National Security Agency (NSA) and Cyber Command, created to defend against internet-based attacks, has called on hackers to help make the web more secure. General Keith Alexander emphasised the common ground between US ...
Tags: hackers, National Security Agency, US, internet-based attacks
Dido Harding, the CEO of TalkTalk, has called for regulatory intervention into the superfast broadband market in order to encourage greater competition. Speaking at the Huawei Broadband Forum, Harding said 95% of the fibre broadband ...
Tags: TalkTalk, CEO, Broadband, Intervention
Hewlett Packard released its fourth-quarter financial results ahead of schedule Tuesday morning, including a charge for $8.8 billion related to its acquisition of U.K. software firm Autonomy. HP says the bulk of the charge, for impairment ...
Tags: HP, Misled Prior, Autonomy Acquisition
The patent battle between Samsung and Apple moves to a federal court in California today. The technology firms have each accused the other of intellectual property infringement, which has led to several court battles around the world in ...
Tags: patent battle, Samsung, Apple, mobile device
Google, Microsoft and Yahoo have remedied a cryptographic weakness in their email systems that could allow an attacker to create a spoofed message that passes a mathematical security verification. The weakness affects DKIM, or DomainKeys ...
Tags: Google, Microsoft, Yahoo, cryptographic weakness, email systems