Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data ...
Tags: Data encryption, Spy-Proof, Surveillance
On the second day of its annual HP Discover user conference in Las Vegas, Hewlett-Packard launched an operating system (OS) designed specifically for cloud computing, called the HP Cloud OS. Initially, however, the software can only be ...
Following the leaking of a court order that showed that the US National Security Agency (NSA) has been harvesting mobile phone call data from the carrier Verizon (and possibly others too), new revelations by The Washington Post claim that ...
Tags: Computer Products, Firms, Tech Firms
The Internet Systems Consortium (ISC), the organization that develops and maintains the widely used BIND DNS (Domain Name System) software, has patched a publicly disclosed vulnerability that can be used to remotely crash DNS servers ...
Tags: Computer Products
The pending launch of Windows Server 2012 release 2 focuses on offering a number of advanced capabilities in storage and networking, which used to require the purchase of additional software, or even a full-fledged storage system. "We see ...
Tags: Windows Server, Computer Products
Microsoft and the FBI have taken aim at a botnet network based on malware called Citadel that is held responsible for stealing people's online banking information and personal identities. The company, however, warned that because of ...
Tags: Computer Products, Microsoft
Lenovo Group Limited (SEHK: 0992) will reportedly begin making ThinkPad Tablet2 by the end of this month in its plant situated in North Carolina. By then, production capacity will be further expanded. From January 2013, the plant has ...
Tags: Computer Products, Lenovo
Microsoft and the FBI have combined forces to strike a major blow against one of the world's biggest cyber crime networks, responsible for stealing more than $500m (£323m) from bank accounts. Aided by authorities in more than 80 ...
Tags: Microsoft, FBI, Cyber Crime Ring
They are said to handle various workloads for segments, including entry-level servers, data centre graphics, microservers, workstations, storage and network appliances. Intel has launched the new Xeon processor E3-1200 v3 product family ...
Tags: Electrical, Electronics
The next version of Microsoft's relational database management system (RDMS) promises to bring immense performance gains to online transactional processing systems. SQL Server 2014 will come with a new in-memory OLTP engine, one built ...
OPEL Technologies Inc of Toronto, Ontario, Canada – which develops III-V semiconductor devices and processes through US affiliate OPEL Defense Integrated Systems (ODIS Inc) of Storrs, CT, USA – says that it has made significant ...
Tags: OPEL, Electrical
The number of malware samples that use P-to-P (peer-to-peer) communications has increased fivefold during the past 12 months, according to researchers from security firm Damballa. The largest contributors to this increase are advanced ...
SAN FRANCISCO -- While premium cable and satellite television channel Starz has through trial and error evolved its mobile device strategy over the past five years, one technology that employees rejected was dual persona smartphones. ...
Tags: Dual Persona Smartphones, Starz, BYOD
Google wants more developers to use its App Engine cloud service, and has launched Mobile Backend Starter to make it easier. Running servers on top of a hosted environment to power mobile apps can be a bit of a headache, according to ...
Tags: Google, Developers, Cloud Service
IBM has signed an agreement to acquire SoftLayer Technologies, as it looks to accelerate the build-out of its public cloud infrastructure. The company is also forming a services division to back up the push. The financial details of the ...
Tags: IBM, SoftLayer, Public Cloud Push