- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
- Akamai admits its OpenSSL patch was faulty, reissues keys
- Glass all gone after one-day sale, Google says
amazon in pictures
Amazon announced its $99 Fire TV set-top box that plugs into an HDTV's HDMI port and includes voice activated searches.
By Lucas Mearian | 03 April, 2014 05:05
The Syrian Electronic Army (SEA), a group of hackers who have made a habit of hijacking high-profile domain names, managed to change the domain registration information for Facebook.com, but failed to redirect the domain to a different server.
By Lucian Constantin | 06 February, 2014 13:47
Amazon's ambitious plan to use flying drones to deliver packages is far-fetched, but not just because of technology limitations or air traffic regulations. Amazon's fulfillment center network, as it stands now, is too limited to serve even a tiny fraction of the U.S. in the method described by CEO Jeff Bezos.
By Nick Barber | 04 December, 2013 13:44
Amazon Web Services this week rolled out a new cloud-based data analytics tool named Kenesis, which can analyze massive amounts of data in real time and be paid for by the hour.
By Brandon Butler | 15 November, 2013 15:24
Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.
By Nancy Weil | 12 December, 2012 13:45
It wouldn't be a mischaracterization to equate the cloud computing industry to the wild, wild west.
By Brandon Butler | 03 December, 2012 13:14
If the iPad doesn't succeed as a consumer electronics device--its initial target market--it may find a successful second career as an electronic textbook reader.
By Jeff Bertolucci | 02 February, 2010 01:31
Whitepapers about amazon
Companies like Amazon.com, Macy’s, and salesforce.com are successful because they are customer-obsessed. Empowered consumers are disrupting every industry, tearing down traditional barriers so that the only sustainable competitive advantage is knowledge of, and engagement with, those customers. Read more to find out how.
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTContent StrategistNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTIT Support EngineerNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTOBIEE BI/DW ConsultantNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTDeliverability SpecialistNSW
Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines
- Can you hear me now? NASA to test laser communication system