First-time surprise entrant Wipro tops the list of rankings in the 18th edition of the Greenpeace “Guide to Greener Electronics,” with Apple dropping two spots to sixth compared to last year’s study. The guide, released ...
Tags: Apple, environmental, Greenpeace, sustainable IT, Wipro
Since the Hong Kong SAR government's establishment of the OGCIO--and its ditching of the ITSD (Information Technology Services Department)--in 2004, many local ICT pros and startups have slammed the government's lukewarm attitude towards ...
Twitter is getting a new look and it's looking a lot like Facebook. Twitter CEO Dick Costolo showed the site's redesign on the Today Show in the U.S. yesterday and talked about putting a new focus on user photos and profiles. ...
Tags: Facebook, redesign, Twitter, user's Twitter page
As part of the LANmark Fibre range, Nexans has introduced Slimflex fibre patch cords, specifically designed for environments with increasing port density, such as the data centre. Slimflex patchcords support Nexans fibre cable strategy ...
Tags: Nexans, Slimflex Fibre, fibre cable, backbone cabling
Samsung’s recent licensing of 64-bit processor designs from ARM suggests that the chip maker may expand from smartphones and tablets into the server market, analysts said this week. Samsung last week licensed ARM’s first ...
Tags: ARM, Samsung, server chips, smartphones, tablets
In his first public appearance since his company's sluggish IPO, Facebook co-founder and CEO Mark Zuckerberg called the social network's stock performance "disappointing." Facebook co-founder and CEO Mark Zuckerberg responded to ...
Tags: IPO, Facebook, Mark Zuckerberg, social network, stock performance, Phone
Ferrotec USA Corp is excited to announce the launch of Pashadelic onto the App Store. Compatible with the iPhone, iPad and iPod touch, this unique crowd sourced photo spot scouting & photography sharing portal gives users the power to ...
Tags: Ferrotec USA Corp, App Store, photo spot scouting, photography sharing
Samsung remained the most popular phone maker in the U.S. in the third quarter, but Apple is slowly closing in, the latest comScore MobiLens report finds. With a couple of successful smartphones under its belt this year, such as the ...
Tags: Apple, Galaxy, iPhone, Mobile leaders, Samsung, Samsung tops Apple
Popular online social networking site Tumblr was ravaged on Monday by an Internet worm that spewed racist and inflammatory messages across thousands of user accounts. The malicious hacking group known as GNAA claimed responsibility. The ...
Tags: Blog site, cybercrime, hackers, highlightedpost, Malicious attack
D'vel, eclectic software house in the IT world, has partnered with Regina in the implementation of its new online store, cuffieregina.it, reorganizing information and structuring an e-commerce service. With it's authentic small works of ...
Tags: D'vel, eclectic software, IT world, online store, e commerce service
With the advent of mobility and the influx of BYOD in enterprise, employers are struggling to keep control of their networks, according to John Yun, Director, Product Marketing, Blue Coat. Yun, who is in Dubai promoting Blue Coat’s ...
Tags: Blue Coat botnets, BYOD, cyber attacks, hackers
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java
While the BYO trend is most commonly associated with employee-owned smartphones and tablets entering the workplace, new research by Cloud and mobile services vendor, LogMeIn, sheds light on another growing aspect of employee-driven tech ...
Hot keywords (Data resource: Made-in-China.com) It's revealed by the statistics of Made-in-China.com that from Jun. to Aug. 2012, in all living room furniture products, American buyers concern TV stand, coffee table, end table and ...
Tags: Living Room Furniture
A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious consideration. The ...
Tags: Apple, hackers, Keychain data, Mac OS X