When in the Cloud, Trust – but Verify

Quite a lot has been written about the importance of due-diligence in a cloud environment. Sometimes the importance of security and compliance-related vetting in the cloud is easy to justify, like when you’re evaluating an off-premises public cloud hosted at a new service provider. Other times, executives might take some convincing, like when you’re talking […]

Scared of Anonymous? NSA chief says you should be

Anonymous has so far plied its trade in “hactivist” exploits. But according to the director of the National Security Agency, it might soon turn its focus to U.S. infrastructure. According to the Wall side road magazine, bringing up sources, Gen. Keith Alexander has said in private conferences on the White area and in other places […]

Microsoft: Google bypassed IE privacy settings too

In the wake of reports that Google had sidestepped privacy settings in Apple’s Safari browser, Microsoft announced today it had discovered that the Web giant had done the same with Internet Explorer. whilen the IE staff heard that Google had bypassed user privateness settings on Safari, we asked ourselves a easy query: is Google circumventing […]

Apple’s and Motorola’s Slip-Slidey Patent Scrap

A regional court in Munich, Germany, has ruled that most of Motorola Mobility’s (NYSE: MMI) smartphone products infringe on Apple’s (Nasdaq: AAPL) slide-to-unlock image patent. users of Apple’s iOS tools slide a virtual button around the monitor in an effort to “release” the tool — in other phrases, wake it up and make it able […]

Cisco Chews Up the Scenery in the Interoperability Drama

Last week, Cisco (Nasdaq: CSCO) raised an objection to the Microsoft (Nasdaq: MSFT) acquisition of Skype, saying it would hurt video conferencing interoperability — even though, in this space, you could argue Cisco is not the poster child for interoperability. Coincidently, I met with the CEO of LifeSize last Thursday, and he saw this Microsoft […]

I.B.M.: Big Data, Bigger Patterns

It’s not just about Big Data. For the big players in enterprise technology algorithms, it’s about finding big patterns beyond the data itself. The explosion of on-line lifestyles and inexpensive pc hardware have made it possible to retailer large quantities of unstructured data, like e-mails or web clickstreams, then search the stored information to seek […]

Feds to automakers: Block drivers’ tweets, texts, surfing

Several states around the U.S. have enacted laws limiting what people can do while driving, but for the first time, the federal government is proposing guidelines all drivers would need to live by. The Department of Transportation yesterday announced a set of auto-technology guidelines, issued by the National Highway Traffic Safety Administration (NHTSA), that would […]

Mobile Apps Take Data Without Permission

The address book in smartphones — where some of the user’s most personal data is carried — is free for app developers to take at will, often without the phone owner’s knowledge. Companies that make many of the most popular smartphone apps for Apple and Android devices — Twitter, Foursquare and Instagram among them — […]

HOW TO Widening Your WiFi Network’s Range

If you’ve followed the advice in my article, How to Improve Your Video-Streaming Clarity, and can’t use a Cat 5e or greater specification wired-solution for your network, you may be running into straightforward environmental limitations. The microwave just isn’t getting from point A to point B and back again. WiFi at 2.4 and 5 GHz […]

The Therapist May See You Anytime, Anywhere

The very idea of psychotherapy seems to defy the instant-access, video screen chatter of popular digital culture. Not for lengthy, if some scientists have their method. previously few years researchers were testing simple video-game-like systems aimed at relieving not unusual issues like nervousness and depression. these latest results were encouraging enough that investigators at the […]

DDoS attacks spread to vulnerable IPv6 Internet

The next-gen Internet, still immature, is now a pathway for Net attacks, a study finds. Also, ideology has become the primary reason for DDoS attacks. The idyllic byways of the next-era IPv6 internet now suffer an illness up to now limited to the mainstream IPv4 web: distributed denial-of-provider assaults. And worse, the still-immature IPv6 network […]

FBI seeks social media monitoring tool

In a move that’s unlikely to sit well with privacy advocates, the FBI has begun scouting for a tool that will allow it to gather and mine data from social networks like Facebook, Twitter, and blogs. The objective is to use the software to stay on most sensible of breaking occasions, incidents and emerging threats, […]

Number of mobile devices to hit 8 billion by 2016, Cisco says

All those devices will drive mobile data traffic up 18-fold, reaching 10.8 exabytes per month, or 130 exabytes a year, by 2016, according to a forecast. If there were any doubt the world is going mobile, it should be tossed out the window today. A Cisco methods’ forecast, launched these days, claims that by way […]

FCC Grudgingly Hangs Up On LightSquared Over GPS Concerns

LightSquared suffered a potentially fatal blow today after the Federal Communications Commission said it would indefinitely suspend the company’s license to turn on a combined satellite/terrestrial communications network because it would interfere with GPS systems operating on neighboring radio bands. The FCC had little choice after the National Telecommunications and Information Administration concluded there was no […]

Cracking Open Google Wallet

It turns out that stealing someone’s Google Wallet funds isn’t that much more difficult than stealing that person’s actual wallet, according to a few recently publicized exploits. I think these types of vulnerabilities threaten to kill the adoption of NFC before it is even fully born, said the Yankee Group’s Carl D. Howe. All forms […]

Mozilla’s plan for 2012: Break the ecosystem lock

Mozilla is best known as the developer of Firefox, but it’s reaching well beyond the browser with a 2012 strategy that strives to use the open Web to counteract ecosystem lock-in. Firefox embodied Mozilla’s attempt to counter the damage that Microsoft’s browser dominance caused on the internet. however now, as found out in Mozilla 2012 […]

Apple, Samsung own 95 percent of all mobile phone profits

Apple and Samsung together hoovered up more than 95 percent of mobile phone profits last quarter, leaving little left for other players, says Canaccord Genuity analyst Michael Walkley. Actually, there wasn’t a whole lot left for Samsung, either, once Apple was done with things. With strong demand for the iPhone 4S, Apple alone took home […]

Is GDrive Ready to Come Out of Its Shell?

Google may soon launch a paid cloud storage service called Drive, five years after it first came up with the idea. Google Drive will let consumers store documents, photographs and videos on Google’s servers for sharing and easy accessibility from any Web-connected device, The Wall Street Journal reported. It is expected to be free for […]

HP To Support Solaris On ProLiant Servers, Blades

Hewlett-Packard will sell and support Sun Microsystems’ Solaris on ProLiant servers at the same level it currently does with Microsoft Windows and other operating systems. The two generation companies, who compete within the server hardware trade, on Wednesday unveiled the expansion of a multiyear partnership settlement beneath which HP will distribute and provide technical enhance […]

Motorola blames hardware for slow ICS upgrades

In New York the other day, a stroller rolled onto the train tracks, passing directly in front of a man that could easily have grabbed the wayward carriage. It used to ben’t until the sound of the stroller hitting the tracks, and a swarm of alert adults ran past him that he discovered the gravity […]