Search

IT News

Asus' new PC convertible can switch between Windows and Android in five seconds

PC maker Asus is taking the Windows-Android hybrid concept to another level with a convertible laptop that can switch between the two OSes with the click of an on-screen button....

07.01.2014

D-Link and Netgear extend wireless range of 802.11ac networks

D-Link and Netgear have both announced so-called range extenders to improve the coverage of Wi-Fi networks based on the 802.11ac specification....

07.01.2014

OEMs, Intel making big mistake with two-headed, dual-OS devices

OEMs and Intel risk damaging both the Android and Windows ecosystems if they go through with plans to sell devices able to run software from both worlds, an analyst argued today....

07.01.2014

Palo Alto Networks acquires stealthy start-up with NSA roots

Next-generation firewall maker Palo Alto Networks today announced its first acquisition, an intriguing buyout of a stealthy Mountain View start-up called Morta Security whose founders hail from the NSA. The price of the purchase was not disclosed....

07.01.2014

More networking news,features and forums

...

06.01.2014

Apple, Cisco, Dell unhappy over alleged NSA back doors in their gear

Germany's Der Spiegel reports that the NSA has compromised a wide range of hardware for years to enable its spying...

06.01.2014

How to Keep Cloud-Based Data Safe

A real-estate brokerage opts to back up critical documents stored in Google Drive....

06.01.2014

US judge dismisses challenge to border laptop searches

U.S. Customs and Border Protection can search travelers' laptops and other electronic devices without a show of reasonable suspicion, according to a federal judge's dismissal of a 2010 lawsuit on Tuesday....

06.01.2014

Skype's social media accounts targeted by hacker group

Skype said its social media properties were targeted, with a group styling itself as the Syrian Electronic Army appearing to claim credit for the hacks....

06.01.2014

Cloud computing 2014: Moving to a zero-trust security model

The leaking of classified documents detailing the data collection activities of the U.S. National Security Agency earlier this year reignited some long-standing concerns about the vulnerability of enterprise data stored in the cloud....

06.01.2014

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker