Much-hacked social networking site Twitter has finally introduced two-factor authentication in a bid to cut down on the hijacking of accounts. The move follows a string of hacks of high-profile accounts by groups such as the ...
Tags: Twitter, Authentication, Google, Facebook
Samsung's Galaxy S4 infringes on 5 Apple patents, according to a court filing by Apple. Apple wants to add the new Galaxy S4 to an ongoing case involving Apple and Samsung being heard in the U.S. District Court, Northern District of ...
Hewlett-Packard reported a 32% drop in profit for its second fiscal quarter, due partly to slower sales of PCs and servers. HP's revenue for the quarter, ended April 30, was $27.6 billion, down 10% from the same period last year, the ...
Improvements to Nvidia's virtualization technology are aimed at turning graphics processors into a more important resource in data centers and could speed deployment of virtual desktops and delivery of data over the cloud. The graphics ...
Tags: Computer Products, Nvidia, Desktop
As overall server market revenue and shipments declined in the first quarter, both Dell and Cisco Systems managed growth while enterprise stalwarts Hewlett-Packard and IBM struggled in the headwinds. Worldwide server shipments declined ...
Tags: Dell, Cisco, Server Market
For the latest release of its Foglight application performance management (APM) software, Dell has provided a new view that summarizes how transactions perform across a system. "We're pulling together all the aspects of a user's ...
Tags: Dell Foglight, Transaction
IDC today drastically lowered its forecast for PC shipments in 2013, a prediction that if accurate means more bad news for Microsoft's Windows 8 operating system. "Lower PC sales are certainly not a positive for Microsoft," said Loren ...
Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process. The system, called Login Verification, gives users the option to have a verification code sent to their mobile phone ...
Tags: Twitter, Sign-in, Computer Products
Thin clients introduced this week by Dell and Hewlett-Packard have faster processors than existing thin clients as well as high-definition graphics capabilities, so they could be alternatives to traditional PCs as computing continues moving ...
Tags: PC, Computer Products, Thin Clients
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users. KitM (Kumar in the Mac), also known as HackBack, ...
Tags: OS X Spyware, Mac, Computer Products
Epiwafer foundry and substrate maker IQE plc says that vertical-cavity surface-emitting laser (VCSEL) devices using wafers produced at its Cardiff, UK facility have broken the 40Gb/s barrier at high temperatures, which is reckoned to be a ...
Tags: IQE Chalmers VCSELs, Electrical, Electronics
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them. Security ...
Tags: Computer Products, software, video games
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them. Security ...
Tags: Computer Products, software, video games
Yoking cognitive computing with customer service, IBM has launched a system that can reference large amounts of unstructured data to help companies better field customer phone calls. The IBM Watson Engagement Advisor uses IBM's Watson, ...
Tags: Computer Products, IBM, Smart Bot
Bit9?has teamed with FireEye and Palo Alto Networks, which each have?sandboxing?technologies, in order to share information related to zero-day attack code. FireEye and Palo Alto Networks, with its next-generation firewall, each have ...
Tags: Computer Products, software