Iron Creek Capital Corp provide an exploration update on recent work completed by Hochschild Mining Holdings Limited the operators of the Victoria Joint Venture project. As a result of a recent cash call by the operators to Iron Creek, Iron ...
Tags: Iron Creek, Victoria Joint Venture project, Iron, Mining
The European Commission (EC) is considering making it mandatory for companies to report cyber attacks to harness the benefits of open dialogue, says vice-president Neelie Kroes. Despite industry opposition, open discussion about cyber ...
Tags: cyber, European Commission, industry opposition, security strategy
The Mars Curiosity Rover, a robot sent to Mars by Nasa principally to investigate the possibility of extra-terrestrial life on the planet, uses many technologies which will be familiar to those in the tech industry. It landed in a crater ...
Tags: Mars Curiosity Rover, robot, Nasa, CSC
Wide-bandgap semiconductor materials such as gallium nitride (GaN) offer far higher performance than traditional silicon but cost significantly more. However, by 2020 GaN costs will drop enough for it to become competitive based on ...
Tags: Bulk GaN, traditional silicon, gallium nitride, reckons market
Balamara Resources has discovered more thick, high grade intersections of zinc, lead and silver at its Montenegro Base Metals Project in central Europe. A resource upgrade for the project is slated for delivery in January 2013. The ...
Tags: Balamara Resources, zinc, lead, silver, zinc-lead-silver
Petrochemical producers are expected to increase investments in Alberta in the coming few years, with the prospects of additional feedstock becoming available and current market conditions favoring NGL and ethane extraction costs, a key ...
Tags: petrochemical, petrochemical spending, NGL, ethane
VMware has fleshed out its desktop virtualisation strategy with a suite of products designed to make desktop computing more manageable by using workspace aggregation. As 30 June, 2014 – the end of support date for Windows XP – ...
When it comes to things that keep CIOs up at night, mobility, particularly bring your own device (BYOD), is at the top of the list or near it. Mobile device management (MDM) products and services are often the reflexive response to the need ...
Tags: CIOs, BYOD, MDM, secure data
As food and beverage cartons become more common on grocery store shelves, they are also becoming more common in curbside recycling bins. In 2009, a group of carton manufactures joined forces as the Carton Council to increase carton ...
Tags: Cartons Can, Packaging, Beverage Cartons
The study examines the medical device coating and surface modification treatment industry, a global enterprise that BCC Research anticipates will reach nearly $8 billion by 2017. It describes the eight coating and surface treatment ...
Tags: medical device, coating and surface modification treatment industry
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
Weak overall economic growth persisted in the third quarter of 2012,increasing by 2.7 percent,and the sluggish pace characteristic of the current expansion is likely to continue,according to the quarterly Manufacturers Alliance for ...
Tags: overall economic growth, current expansion, sluggish pace
The ability to spin a good yarn recently kept an international team of researchers focused on Gossypium raimondii,the simplest cotton genome.The researchers,including Jeremy Schmutz,faculty investigator at HudsonAlpha and head of the plant ...
Tags: Cotton Strain, pesticide, USDA, Accumulating Genetic Markers
Bring your own device (BYOD) programmes have provided the most radical shift in the economics of client computing for business since PCs invaded the workplace, according to research conducted by Gartner. BYOD is an alternative strategy ...
Tags: BYOD, cloud computing, Gartner, mobile devices, tablets
Intrusion prevention systems -- security tools designed to stop problems even before they crop up -- have emerged as indispensable components of defense-in-depth security strategies. But a key success factor for the technology is it ...
Tags: Intrusion prevention systems, IPS, security tools, security strategies