Misleading statements and fiction about toy safety are often communicated to the general public. The public must have access to the facts, so that they can make informed decisions about purchasing safe toys for their children. We want to ...
Tags: Toys, Toy Safety, Misleading statements, fiction
Projectbook is a new note-taking and task management application for the iPad from Theory.io. (See Macworlds recent story on Projectbook for a thorough description of the app.) Ive been using the iPad offering since its recent release and, ...
Tags: iPad, projectbook, application
Novosoft, an international IT-consulting and software development company, today announced the plan to release a line of software products featuring integration with popular Online hosting services. The new solutions will harness the ...
Tags: Novosoft, IT consulting, software development, software, software products
Microsoft has ditched the 30-day grace period, a trademark of Windows 7, in the retail copies of Windows 8, mandating that users provide a product key during setup. The change runs counter to previous practice by the Redmond, Wash. ...
Tags: Microsoft, grace period, trademark, Windows 7, retail copies, Windows 8
Criminals are sending malicious emails that purport to come from payroll services firms in order to infect with malware the computers of payroll administrators from various companies, according to researchers from the SANS Internet Storm ...
Tags: criminals, malicious emails, payroll services firms, ISC
IGEL Technology, a leading worldwide thin client manufacturer, announced today its partnership with international IT and data security specialist, CenterTools. The partnership strengthens IGEL's commitment to providing the highest level of ...
Tags: IGEL Technology, thin client manufacturer, IT, data security
Broadcom plans to bring IEEE 802.11ac Wi-Fi to smartphones starting early next year, using a chipset announced Tuesday that the company said can deliver about 300Mbps of real-world speed. The 802.11ac standard is the next generation of ...
Tags: Broadcom, IEEE 802.11ac, smartphones
The file-sharing company BitTorrent has begun testing an advertising model through which it would share ad revenue with content producers whose work is downloaded through the service, promising a way for artists to monetize informal sharing ...
Tags: BitTorrent, advertising model, ad revenu, content producers
Video-conferencing is yesterday's news. VC-on-mobile is the tech of the future. But the CIO of DDB Mudra Group is doing it here and now. New Delhi, Ahmedabad, Kolkata, Chennai, Mumbai, Vizag, Trivandrum. If this list is exhaustive to ...
Tags: DDB Mudra Group, VC, mobile
Companies belonging to the Swedish Karlit group filed a bankruptcy application with a court in Uppsala after restructuring attempts made in recent weeks led down a dead-end street. A court-led reorganisation (Företagsrekonstruktion) ...
Tags: Swedish, Karlit group, bankruptcy, MDF
When Apple switched to Intel processors, Windows switchers as well as Mac users who needed to run the occasional Windows app rejoiced. That's because the chip switch was soon followed by the release of virtualization software that would ...
Tags: Apple, Intel processors, Windows switchers, Parallels Desktop 8
Alcatel-Lucent’s enterprise division this week jumped into the SDN market with a strategy to fortify products to enhance network programmability and virtualisation. The company is augmenting its Application Fluent Network strategy ...
Tags: Alcatel Lucent, data centre, LANE network, software
Business cloud storage provider Box announced the launch of Accelerator, a network optimization service that it said can increase the speed of uploads and downloads over its existing service by up to 10 times. On average, file uploads to ...
Tags: business cloud storage, Box, Accelerator, network optimization service
Bring your own device (BYOD) programmes have provided the most radical shift in the economics of client computing for business since PCs invaded the workplace, according to research conducted by Gartner. BYOD is an alternative strategy ...
Tags: BYOD, cloud computing, Gartner, mobile devices, tablets
Researchers from security vendor Damballa have identified malicious Internet traffic that they believe is generated by a new and elusive variant of the sophisticated TDL4 malware. The new threat, which has been assigned the generic name ...
Tags: TDL4 malware, Internet traffic, elusive variant, Fortune 500 Companies