A lot of the open source projects I really dig are things like Syllable OS, a non-Linux-based attempt to create a 'best practices' open source desktop operating system, and Uzebox, a really cool 'retro-minimalist' games console based on open source hardware.
On 5 November I joined a large crowd of other Sydneysiders at the Occupy Sydney protest. As at many other protests over the last half decade, the crowd was full of people either documenting the protest by filming and taking photographs or tweeting.
Last time I took a brief holiday I came back to work to find that HP had killed webOS (and there was a lightsaber on my desk).
I recently had the chance to spend some quality time with the Nokia N9: The glittering debut and sad curtain close for the Finnish phone company's MeeGo efforts.
So what is Amazon up to now?
It's the resignation that has sent shockwaves through geekdom. A tragic loss of someone who was a real pioneer in his field -- I mean sure, he's still kicking but he's stepped down from the role that's made him famous.
You know how it goes. You're out of the office for a few days and come back to find HP has acknowledged its grand hopes for webOS have come to naught and there's a lightsaber on your desk.
There are people who think software development is devoid of creativity. Of course, anyone who has even a passing interest in development, or, say has ever found him- or herself having a late night chat in a disreputable Sydney pub with a Drupal/Node.js developer, knows that this is untrue.
It's a sad ending and a new beginning for Techworld Australia. Last week we bade farewell to the site's founding editor: Rodney Gedda.
Probably the most interesting thing to come out of Malcolm Turnbull’s speech at the National Press Club yesterday was the idea that the coalition, given the opportunity, would separate Telstra and transfer the wholesale assets to a new “Network Co”. At TechWorld we posed a similar idea, but we can’t help but ask, is it workable?
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTMicrosoft Business Intelligence DeveloperNSW
- FTOBIEE BI/DW ConsultantNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTIT Support EngineerNSW
- FTDeliverability SpecialistNSW
You need to secure your BYOD devices—but MDM alone isn't enough to prevent data loss. Read this whitepaper—Data Loss Prevention: When MDM Is Not Enough—to learn how to combat MDM shortcomings. See how to add cross-platform security, implement protection policies, and address risks in consumer apps.
- Kim Dotcom says he's set to get assets back
- NBN Co seeks ‘early resolution’ of TPG fibre threat
- Sedgman unearths greater value for cost with ITSM switch
- Teen arrested in Heartbleed attack against Canadian tax site
- A look at the world's most powerful X-ray laser
- IBM profit falls on weak hardware sales, transition costs
- In Pictures: Ubuntu 14.04 LTS
- Google revenue jumps 19 per cent but still disappoints
- AT&T wearables to hit the smartwatch runway soon
- Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test
- Automakers show off in-vehicle Wi-Fi, new smartphone interfaces
- US court rejects Lavabit appeal, cites improper procedural handling
- Connecting for Good wrestles Kansas City's digital divide
- Chrome users won't give up, keep pressing Google to restore old-style new tab page
- Still deploying 11n Wi-Fi? You might want to think again