- Akamai admits its OpenSSL patch was faulty, reissues keys
- Google updates terms of service to reflect its scanning of users' emails
- Glass all gone after one-day sale, Google says
- How to fix the two-factor authentication log-in error in Gmail on Android
Apple's iPhone 4 boasts 512MB of system memory, double the amount in last year's iPhone 3GS and the newer iPad tablet, Computerworld has confirmed.
By Gregg Keizer | 18 June, 2010 08:12
While the fourth-generation iPhone could come out this week at Apple's Worldwide Developers Conference (WWDC), it's not too early to peer into the future and speculate what 2011 could mean for iPhone fans.
By Brad Reed | 06 June, 2010 07:28
Apple CEO Steve Jobs used the D8 Conference on Tuesday to air his views on a variety of issues, including Adobe Flash, Google, ATT, and the next-gen iPhone controversy.
By Ian Paul | 03 June, 2010 01:53
If you leave your cell phone on a restaurant table, do I have the right to examine it and publish the details of your life? Of course not. If I did such a thing you'd probably set a lawyer on me and attempt to sue the bejeezus out of me. And rightly so; your private business should remain just that -- private.
By Mark Gibbs | 01 May, 2010 02:47
Apple's notable successes, the iPad and iPhone, hide an important fact: Apple's secrecy comes at the expense of success with business customers. In essence, Apple accepts a position of limited influence in the business world in exchange for a marketing strategy that manipulates consumers brilliantly.
By David Coursey | 28 April, 2010 05:36
At today's announcement of iPhone OS 4.0, Apple unveiled seven major features in the latest version of its OS.
By Ginny Mies | 09 April, 2010 08:22
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTIT Support EngineerNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTOBIEE BI/DW ConsultantNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTDeliverability SpecialistNSW
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring significant security risks. How do you navigate the challenge and emerge with both? With a comprehensive approach to security.Learn the key areas to focus on as you build a mobile app security strategy.
- Windows XP's retirement turns into major security project for Chinese firm
- Strong PS4 sales create supply problems for Sony
- Telcos seek to strengthen NBN Co wholesale restrictions
- Kim Dotcom says he's set to get assets back
- NBN Co seeks ‘early resolution’ of TPG fibre threat
- Sedgman unearths greater value for cost with ITSM switch
- Teen arrested in Heartbleed attack against Canadian tax site
- A look at the world's most powerful X-ray laser
- IBM profit falls on weak hardware sales, transition costs
- In Pictures: Ubuntu 14.04 LTS
- Google revenue jumps 19 per cent but still disappoints
- AT&T wearables to hit the smartwatch runway soon
- Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test
- Automakers show off in-vehicle Wi-Fi, new smartphone interfaces
- US court rejects Lavabit appeal, cites improper procedural handling