Mozilla yesterday took another step toward delivering a "Metro" version of Firefox to Windows 8 users. Late Tuesday, Asa Dotzler, the Firefox desktop product manager, announced that a preliminary Metro browser had reached ...
Oracle is once again attempting to prove that Google illegally copied unlicensed software code in its Android mobile operating system, but this time the Java developer is invoking the spirit of Harry Potter to push its claim through the ...
Tags: Oracle, Google, unlicensed software code
MSC Gleichmann will be running a one-day workshop covering hardware and software design of graphical LCD user interfaces in embedded applications. It will focus on the Renesas 32-bit RX-series microcontroller development environment and ...
Following on from more than a decade of collaboration, Red Hat on Tuesday announced that it has joined the HP Enterprise Services Technology Alliance programme. HP Enterprises Services offers Red Hat products as part of its Standard ...
Tags: Red Hat, HP, Alliance Programme
IDG News Service - With MySQL 5.6, released Tuesday, Oracle has updated the open-source database to make it more competitive with NoSQL data stores such as MariaDB or Cassandra. "We're in constant dialogue with our customers and users, ...
Tags: MySQL, NoSQL Competitors, company news
Facebook has updated its policies for third-party application developers in a bid to explain why Twitter’s new Vine video-sharing app is unable to access Facebook’s friend-finder tool. While the updated policies don’t ...
Tags: Facebook, Developer Policy, Vine Scuffle
Users who signed into third-party Web or mobile applications using their Twitter accounts might have given those applications access to their Twitter private "direct" messages without knowing it, according to Cesar Cerrudo, the chief ...
Tags: Twitter, security consultancy, company news
With the release of the first service pack for Microsoft System Center 2012, Microsoft is taking another step in its ambitious goal of helping customers manage their on-premises IT and Microsoft Azure cloud services with a single set of IT ...
Tags: Microsoft System, on premises IT, cloud service, IT management
A new beta version of Google's Chrome browser for PCs can run Web applications controlled via user voice commands, so that people will be able to play computer games and compose documents through speech. The beta of Chrome 25 features the ...
Tags: Google, Chrome browser, computer games
Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people behind the ongoing DDoS attack campaign against U.S. financial institutions -- thought by some to be the work of Iran -- ...
Tags: U.S.banks, junk traffic, DDoS attack campaign, U.S.financial institutions
Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people behind the ongoing DDoS attack campaign against U.S. financial institutions — thought by some to be the work of ...
Tags: bank attacks, botnets for hire, cyber attacks, Homeland Security, Iran
FLIR Systems has introduced the affordable SC35, SC15 and SC5 camera packs for R&D applications. Thermal imaging cameras can be used for a wide variety of R&D applications. However until now access to high performance thermal imaging ...
Tags: FLIR Systems, affordable SC35, camera packs, R and D applications
Ford has launched an open developer program for its in-car infotainment system at the 2013 Consumer Electronics Show (CES) in Las Vegas, making it the first car maker in the world to enable software developers to create apps for its ...
Tags: Ford, open developer program, in car infotainment system, company news
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cybercriminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from Australian security ...
Tags: cloud providers, botnets, cybercriminals, malicious traffic
Students at a military graduate school in California are mining social media with new methods that may change the way the armed forces collect intelligence overseas. Students and researchers at the Naval Postgraduate School have tackled ...
Tags: armed forces, social media, Twitter, intelligence, overseas