CBR caught up with Jive CEO, Tony Zingale, to discuss why social business software will go mainstream in 2013. What are the main differences between social tools and social business software? The main difference is social business ...
The Reserve Bank has denied reports that its computer systems or networks have been compromised by hackers, saying that at no point has any data or information been lost or its systems corrupted. Responding to a report in yesterday's ...
Tags: IT security, computer systems, cyber attacks
Microsoft's anti-Google "Scroogled" campaign is a battle for hearts and minds as much as for search and email market share, an analyst said today, but its effectiveness can be measured. "Scroogled is an attempt to change hearts and ...
Tags: Microsoft, anti-Google, email market share
The Reserve Bank of Australia's computer systems have fallen victim to cyber hacking in at least two highly sophisticated online attacks. Documents released by the RBA show that the central bank was the victim of a "highly targeted" email ...
Tags: Hackers, RBA computers, malicious software
The Curtain Exchange, a designer drapery retailer in Louisville, Kentucky will be hosting the Peacock Alley Bedding Trunk Show on Thursday, March 21 from 1-7 pm at The Vogue Center in St. Matthews. The trunk show offers guests the ...
Tags: Curtain Exchange, Peacock Alley Bedding Trunk Show, trunk show
Home automation has come to the iPhone with sophisticated tools that let you automatically turn lights on at sunset, receive a text if the front door opens at night, or turn on airconditioning when your cat goes to the litter. This ...
Tags: WeMo system, home automation, WeMo switches
Mobile carriers should deploy a number of safeguards to protect their customers against a growing problem of unauthorized billing through mobile payments, the U.S. Federal Trade Commission said in a report released Friday. The FTC report ...
Tags: Bill Cramming, mobile payment, cyber safety
Recent reports from antivirus companies seem to suggest that the number of Android malware threats is growing. However, there are still many skeptics who say the extent of the problem is exaggerated. The security industry has an ...
Tags: antivirus companies, Android malware threats, credibility issue
A day after researchers hacked Chrome and Firefox at the Pwn2Own contest, Google and Mozilla patched their browsers Thursday. The contest also wound down yesterday after hackers had earned a record $480,000 over two days. The update to ...
Tags: Chrome, Firefox, Google Mozilla
Huawei Technologies' enterprise division further ramped up its European presence by gaining certification to run SAP's HANA in-memory platform on its servers. Deals with SAP and other big software vendors will be key for Huawei to succeed ...
Tags: Huawei Technologies, European presence, in-memory platform
The Android operating system has been cleared of patent infringement in a case brought by Nokia against Android smartphone maker HTC. Nokia on Friday lost two patent suits it brought against HTC in the District Court of Mannheim, Germany, ...
Tags: Android operating system, patent infringement, Android smartphone
Motorola Mobility is cutting 1,200 jobs, in addition to a reduction of 4,000 jobs it announced in August, to focus on high-end devices. "These cuts are a continuation of the reductions we announced last summer," said Motorola spokeswoman ...
Tags: Motorola Mobility, high-end device, Google
Patents management company MPEG LA announced agreements with Google, granting the Internet giant a license to techniques that may be essential to the VP8 video codec that the Internet giant backs. VP8 is a video compression technology ...
Tags: MPEG LA, patents management, VP8 video
Dorset County Council has selected enterprise content collaboration platform Huddle as a data sharing platform to help to manage its broadband delivery plans. Tech City’s Huddle secures third round of funding Huddle secures vast ...
Kaspersky Lab's Internet Security 2013 product contains a bug that can be exploited remotely, especially on local networks, to completely freeze the OS on computers running the software. The bug can be attacked by sending a specifically ...