Search

IT News

Detroit wants its own high-tech visa

Detroit, a city in bankruptcy and dealing with a shrinking population, hopes to turn itself around with the help of 50,000 employment-based green cards....

28.01.2014

BYOD IT Skills in High Demand

The rise of BYOD is making an impact on a variety of IT positions, from help desk to mobile app development to security and compliance. In fact, according to one research firm, its one of the only bright spots on the IT jobs landscape....

28.01.2014

Why I did it: Former hacker Mitchell Frost explains his motivation

In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school's computer network to control the botnets he had created. Authorities say between August 2006 and March 2007, Frost launched a series of denial of service (DDOS) attacks against several conservative web sites, including Billoreilly.com, Anncoulter.com and Rudy Giuliani's campaign site, Joinrudy2008.com. He is accused of taking down the O'Reilly site five times, as well as disrupting the University of Akron's network during a DDOS attack Frost allegedly launched on a gaming server hosted b...

28.01.2014

Microsoft's quandary: Big profits from software or shrinking margins with devices

For all his talk of "devices and services," when Steve Ballmer hands over the reins to a new CEO, he will leave an economic powerhouse that prints money by making software, but makes little on anything else....

28.01.2014

Danger looms at the 2014 Winter Olympic Games in Sochi, but is Russia's security up to snuff?

That's how much has been spent on the 2014 Winter Olympic Games in Sochi, Russia so far, with the final tab projected to be even higher. Though various elements factor into this being the costliest Olympics ever -- to put things into perspective, China spent $40 billion on the 2008 Summer Olympics -- security is a big one....

28.01.2014

10 big myths about Big Data

Big Data has dominated tech news of late. It has been touted as a possible solution for everything from intrusion detection to fraud prevention to curing cancer and setting optimal product prices....

28.01.2014

Can TVs and refrigerators really spew botnet spam?

Refrigerators might hold spam to keep it cold in the meat bin. But in the Internet of Things world, can fridges connected to the Web blast malicious e-mail as part of a botnet? And how about TVs or other smart devices? In the stranger side of the Internet of Things, Proofpoint said it uncovered a cyberattack in which compromised refrigerators and TVs sent out malicious e-mail. But Symantec, says it saw no evidence of such an attack....

28.01.2014

Report: Spy agencies collude to gather personal data from mobile apps

Spy agencies including the U.S. National Security Agency have been working together to extract personal information, including location data and address books, from mobile apps as part of a globe-spanning effort to thwart terrorist plots, according to newly disclosed documents provided by former NSA contractor Edward Snowden....

28.01.2014

Android now has more than half of U.S. smartphone sales

Android represented more than half of U.S. smartphone sales in the last quarter of 2013, while the iPhone's share dropped to 43.9%, said Kantar WorldPanel ComTech....

28.01.2014

With BYOD smartphones on the rise, IT headaches will become migraines

The bring-your-own-device trend will only get more nerve-wracking for IT managers in 2014 because of the 30% annual growth expected for smartphones purchased under a BYOD approach, and the further emergence of Windows Phone as a third platform behind Android and iOS....

28.01.2014

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker