WinMagic Inc., the innovator in data security and encryption solutions, today announced it had been awarded a multi-country contract with one of the Big Four global Tax, Advisory and Audit firms housing over 140,000 employees globally. ...
Tags: WinMagic Inc, data security, encryption solution, software
Crawler, LLC, a leading innovator of global technology, announces the release of its new no-cost Classic Start 8 software application allowing Windows(R) 7 users to continue using a traditional style start menu within the Microsoft ...
Tags: Crawler, global technology, software application, software
Google isn't getting coal in its stocking this year,but Santa's helpers have decided to ditch the popular Google Maps for Microsoft's Bing service. Once again,on Christmas Eve,the North American Aerospace Defense Command(NORAD)will be ...
Tags: Google, Google Maps, Microsoft's Bing service, Santa
The U.N.’s civil aviation body will recommend creating a cyber security task force at a meeting next week in Canada, as new technologies introduced into aviation systems are increasing the risk of cyber attacks. The International ...
Tags: cyber security, UN, United Nations, new technologies, cyber
IGEL Technology, a leading manufacturer of thin client hardware and software solutions, demonstrated its first Microsoft RemoteFX-certified system-on-chip (SoC) thin client this week at the Microsoft TechEd North America conference in ...
Tags: IGEL Technology, hardware, software solution, mobile application
Samsung remained the most popular phone maker in the U.S. in the third quarter, but Apple is slowly closing in, the latest comScore MobiLens report finds. With a couple of successful smartphones under its belt this year, such as the ...
Tags: Apple, Galaxy, iPhone, Mobile leaders, Samsung, Samsung tops Apple
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java
MadCap Software, Inc., the leader in multi-channel content authoring and a showcase company for Microsoft Visual Studio and Microsoft XPS, today announced that it has published a new case study on Blackbaud. A leader in technology solutions ...
Tags: MadCap Software, Microsoft Visual Studio, Microsoft XPS, Blackbaud
Harry Selent, President of MedicalBillingSoftware, announced today the public availability of Medisoft's popular medical practice management software for medical billing services and physicians in the USA. Physicians and Medical Billing ...
Tags: MedicalBillingSoftware, Medisoft, medical practice, software
A new approach to mobile Internet protocols could improve the usability and reliability of mobile applications. At the annual Usenix tech conference last month in Boston, two MIT researchers formally unveiled a new protocol, and a remote ...
Tags: mobile Internet protocols, new approach, MIT
The amount of mobile Android malware has surged this year, from a count of 30,000 malware specimens in June to almost 175,000 last month, according to Trend Micro’s Security Roundup report for the third quarter of this year. ...
Tags: Android, apps, Google, highlightedpost, malware, security, Trend Micro
Microsoft Windows 8 support for TPM Tipping point for TPM TPM gathers momentum The end of the password? TPM in action across all devices Since 2006, many new computing devices have been sold with a built-in trusted platform module ...
Tags: Microsoft Windows 8, TPM, password
Anticipating greater usage of Ubuntu within the enterprise, Canonical has released a significant update to its Landscape Ubuntu system management tool. “We have really been cranking up the level of effort with Landscape over the ...
Tags: Canonical Ubuntu, management tool, upgrade, Landscape Ubuntu system
A computer worm that propagates by exploiting a 2010 Windows vulnerability is responsible for some of the recent incidents involving network printers suddenly printing useless data,according to security researchers from Symantec. Many ...
Tags: rogue printouts, Security Researchers, computer worm, Trojan program
Citrix has extended the XenApp product lifecycle to align it with the lifecycles of corresponding Microsoft server platforms. But IT pros are advised to upgrade quickly to avoid extended support costs that could add up to about euro 200,000 ...
Tags: Citrix, XenApp product lifecycle, Microsoft, EOL