Al Franken - News, Features, and Slideshows
The U.S. Federal Communications Commission's Web comments form crashed Tuesday morning in the hours before the agency's first deadline for submitting comments on its net neutrality proposal.
By Grant Gross | 16 July, 2014 00:42
A recent report from the U.S. intelligence director that provides the number of surveillance targets in 2013 is not specific enough to provide the transparency the nation's residents need, two senators said Monday.
By Grant Gross | 01 July, 2014 06:19
The U.S. Congress must pass legislation to ban mobile spying apps in order to protect victims of domestic violence, a senator said Wednesday.
By Grant Gross | 05 June, 2014 08:06
The U.S. Federal Communications Commission should delay its scheduled May 15 vote on a new net neutrality proposal because of public outcry that the rules aren't strong enough, a commissioner said.
By Grant Gross | 08 May, 2014 23:34
The proposed US$45.2 billion acquisition of Time Warner Cable by Comcast would give the company huge market power to determine broadband prices and Internet content, a group of U.S. senators said Wednesday.
By Grant Gross | 10 April, 2014 04:32
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
By Grant Gross | 07 November, 2012 19:06
UXC Connect’s Jesmond Psaila says that DevOps can do for IT operations what Agile did for software development. This paper demonstrates how, by combining both approaches, you can significantly improve operational efficiency and time-to-market. • Marketing and development teams want to constantly change or increase functionality, while IT operations teams want to keep the environment as stable as possible • Agile software development and virtualisation have not solved the time-to-value problem faced by marketing and IT operations teams • Recent movements in DevOps aim to address and redefine a more agile service management platform, while new tools have vastly improved functionality to configure and automate common processes
- FTDigital Media PlannerNSW
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTSenior Media TraderNSW
- FTChief Information OfficerNSW
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
- Backoff malware infections are more widespread than thought
- IBM Watson cooks up some new dishes
- Apple will keep pushing for a sales ban on Samsung products
- Facebook testing mobile searches for old posts
- Appeals court denies Oracle request to restore $1.3 billion judgment against SAP
- Scientists create one robot brain to rule them all
- Intel amps up desktop performance with its first 8-core PC chip
- IDC: Tablets sales growth to slow this year
- Can SDN usher in better IT security?
- Chrome for Mac to desert early Intel Mac owners by October
- Mozilla presses forward with new revenue plan, debuts ads in Firefox preview
- Drivers want their cars to get to know them better
- Nokia's navigation service Here comes to Samsung smartwatch and Galaxy
- As smartphone screen sizes max out, stylish designs expected at IFA
- CryptoWall held over half-a-million computers hostage, encrypted 5 billion files