- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
- Akamai admits its OpenSSL patch was faulty, reissues keys
- Glass all gone after one-day sale, Google says
Email, perhaps still the most widely used Internet application, has about the same level of security as a postcard. But unlike postcards, it's widely depended on by businesses.
By Jeremy Kirk | 03 February, 2014 04:45
U.S. President Barack Obama failed to address the National Security Agency's reported efforts to weaken encryption standards and circumvent online encryption technologies in a speech Friday about surveillance reform.
By Grant Gross | 17 January, 2014 20:47
U.S. President Barack Obama's proposed changes to the National Security Agency's surveillance programs don't go far enough, some technology and digital rights groups said, while others hailed it as a good first step.
By Grant Gross | 17 January, 2014 20:00
The U.S. Department of Justice defended the National Security Agency's massive phone records collection program after a U.S. District Court judge ruled Monday that the program is likely to violate the U.S. Constitution.
By Grant Gross | 16 December, 2013 22:03
An industry consortium featuring some of the biggest names in technology – including Google, Microsoft, Facebook and Reddit – is urging the Obama Administration to support a major overhaul of laws governing electronic surveillance.
By Jon Gold | 10 December, 2013 18:04
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
By Grant Gross | 20 December, 2013 16:11
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
By Grant Gross | 07 November, 2012 19:06
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTContent StrategistNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTOBIEE BI/DW ConsultantNSW
- FTIT Support EngineerNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTDeliverability SpecialistNSW
IT departments have a huge opportunity to make their enterprises more agile, cost efficient and competitive by embracing the opportunities available through mobile devices and connectivity. Embracing mobility doesn't have to be complicated or costly - this report tells you how.
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines
- Can you hear me now? NASA to test laser communication system
- Japan gets first bitcoin ATM, two more on order