A bill proposed in the U.S. Senate aims to block imports of products containing U.S. technology stolen online, a move that appears primarily directed at China. Introduced by four senators, the Deter Cyber Theft Act would require the U.S. ...
Tags: Computer Products, software
Like horses to the slaughterhouse PETA drones a trophy prize for US hunters Biggest wine hoax in history reveals trade secrets A substitute for the slaughterhouse; an alternative to the abattoir? Instead of killing cattle with a stunbolt ...
Tags: Killing Cattle Softly, Food
Co-Diagnostics has signed an agreement with DNA Logix, a molecular diagnostic assays developer, to buy certain technologies for genetic analysis in the clinical, industrial, and bio-threat segments. The technology to be gained is embodied ...
Tags: Suite of Technologies, Medicine
Microsoft has discovered an unusually stealthy Trojan capable of deleting the files it downloads in order to keep them away from forensics investigators and researchers. The Trojan downloader,?called Win32/Nemim.gen!A, is the latest ...
Tags: Microsoft, Computer Products
Related Media Defense of biotechnology is personal Biggest wine hoax in history reveals trade secrets Whiskey is for drinking; agriculture water is for fighting Eating lunch while catching up on the news, the headline “Monsanto ...
Tags: drinking, agriculture water
A billion Chinese each drank 1.4 liters of wine in 2011, or at least that’s how the average plays out. On the surface 1.4 liters doesn’t seem of much consequence — outpaced by America’s 11.2 liters of wine per capita ...
Tags: wine, wine market, wine exports
Epicor is suing IT service provider Alternative Technology Solutions, claiming the company illegally used its ERP (enterprise resource planning) software in order to develop and sell add-ons and services, in a case that has parallels to ...
Tags: Software, Computer Products
Farmscrapers are vertical farming on steroids A glass of Hitler Cabernet with a Mussolini chaser Farm murders met with media silence The wine rumors were always there. Whispers and suspicion over various vintages were a constant. But the ...
Tags: Wine Hoax, Trade Secrets
China's plan to create a substantial outsourcing industry was hit with another blow last month with the release of a report that laid bare, in ways never seen before, the extent of the security risks of working in the country. Ten years ...
Tags: substantial outsourcing industry, China, security risk
Handling original equipment manufacturing (OEM) contracts in China can be a bit of a minefield, especially for the new-to-China business. Stories of molds and design IP being ripped off and then sold by your own supplier are legendary. Here ...
Tags: Focus Vision, China, Common Issues, OEM
For 2012, GigOptix Inc of San Jose, CA, USA (a fabless supplier of analog semiconductor and optical components enabling high-speed end-to-end information streaming over optical fiber and wireless networks) has reported total revenue of ...
Tags: GigOptix, semiconductor, optical components
A US court has dismissed a legal appeal made by Hexbug creators Innovation First International (IFI) against RoboFish manufacturer Zuru Toys. The federal district court in Dallas, Texas affirmed by the Fifth Circuit Court of Appeals, ...
China has for years been developing an IT outsourcing industry aimed at bringing in business from the U.S. and Europe. It has succeeded, but then again it hasn't thrived and now may face more barriers. China's IT and business process ...
Tags: China, IT outsourcing, outsourcing industry
The US faces a growing threat from trade secret theft by foreign hackers and needs to apply new legislation and diplomatic pressure in order to protect American businesses. That's what a White House spokesman told the press at an event to ...
Tags: US, trade secret theft, diplomatic pressure
China is by far the most aggressive, but not the only, country attempting the sort of extensive cyberespionage described in security firm Mandiant's dramatic report, released this week. Several other countries, most notably Russia, are ...
Tags: cyberespionage, information technology, communications sectors