In some funny places in the outside world, Switzerland is known as being a country full only of rich people with golden Swiss wristwatches eating Swiss (!) chocolate 24 hours a day. This by far is not true. However, in each rumor there is a ...
Tags: Switzerland, culture, Swiss
It’s no secret that SAP’s HANA in-memory database has become the centrepiece of the software vendor’s technology strategy. HANA features heavily in pitches for both high-speed analytics and in support of transactional ...
Tags: SAP, HANA in-memory database, technology strategy, AWS
The Swedish mechanical engineering company Vitech is bankrupt. A declaration to this effect was made on 11 February before the competent court inongermanlands. The supplier of sawmill-mechanisation plant, as well as its parent company ...
Tags: mechanical engineering, Vitech, Bankruptcy
Recently, the annual figures of the national gross domestic products (GDPs) of various countries of the European Union (EU) were published. Most of them are not very favorable compared to those for Asian countries. Most of them show a ...
Tags: GDP, European Union, finance
A new report traces a large cybersecurity threat group to China's People's Liberation Army, specifically a unit that goes under the cover name "Unit 61398." Security company Mandiant said in a report released Tuesday that an Advanced ...
Tags: Report, Cyberspying Group, China's Army
China this week faced allegations that it is helping the Zambian government with deep packet inspection technology in order to eavesdrop, mine data, censor and intercept communications. The allegations come less than two years after the ...
Tags: Zambian government, packet inspection technology, Chinese tech
News reports indicate that Mayor Michael R. Bloomberg may propose restrictions on the use of polystyrene foam foodservice products in New York City, ostensibly as a way to increase recycling rates. American Chemistry Council (ACC) vice ...
Tags: polystyrene foam foodservice products, Plastics makers
Apple says it has been hit by hackers who wormed their way into the California company's system but evidently failed to steal any data. The maker of iPhones, iPads, iPods, and Macintosh computers said it is working with law enforcement ...
Tags: APPLE, iPhones, iPads, iPods, Macintosh computers
Newspapers are filled with stories describing reductions and removal of street lighting in order to reduce municipal costs. Tackling the tricky questions of when and where to install roadway illumination is a challenge for transportation ...
Tags: Roadway Lighting, Lighting, Lights
Aurora World is producing a new Garfield plush range. The Garfield cartoon was first introduced in 1978 and is now featured in over 2,100 newspapers across the globe, holding the Guinness World Record for the most syndicated cartoon ...
Japanese police have arrested a man suspected of being behind a computer hacking campaign following an exhaustive hunt that at one stage had authorities tracking down a cat for clues, reports said. Yusuke Katayama, 30, was arrested on ...
Tags: computer hacking campaign, cat, Tokyo
DASCOM(R) Americas , a recognized leader in complete business printing solutions and OEM of the Tally(R) and TallyDASCOM(R) line of serial matrix, thermal, specialty and point of sale printers, today announced a renewed focus in assisting ...
Tags: DASCOM(R)Americas, business printing solutions, sale printers
Two U.S. lawmakers plan to reintroduce a controversial cybersecurity bill that allows private companies to share customers' personal information related to a wide range of cyberthreats with government agencies. Representatives Mike ...
Tags: cybersecurity, U.S., bill
President Obama could use tonight's State of the Union address to continue a push for new cybersecurity legislation, even as he's widely expected to issue an executive order Wednesday to impose rules aimed at protecting critical ...
Media organisations and journalists are coming under increasingly regular cyber-attacks, with hacking being used as a tool to censor the press. "We have seen distributed denial of service attacks against individual journalists and against ...
Tags: cyber-attacks, hacks, cyber security