The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them from January 1 to March 27.
By Ellen Messmer | 09 April, 2014 08:30
Microsoft stopped support for Windows XP on April 8: Meaning, no more software or security updates for the nearly 13-year-old OS, despite it still holding onto just under 30% of the desktop OS market (according to NetMarketShare). Microsoft wants XP users to upgrade to a newer Windows OS, preferably Windows 8.1. Yet many people are determined to hold on - you’ll have to pry Windows XP from their PC’s cold, dead hard drive. Here are nine reasons why.
By Howard Wen | 08 April, 2014 07:55
Microsoft on Wednesday unveiled Windows Phone 8.1, the first major update to its mobile OS since autumn 2012. There’s a Siri-like personal assistant, centralized notifications, an array of new customization options, and a redesigned keyboard for fast text entry.
By John Cox | 04 April, 2014 08:59
Many companies have felt the effects of data theft over the last several years. It's 2014 and it doesn't look like the going is getting any easier. The technology sector seems most at risk with every week bringing the world another reported data breach. Here we look at the largest breaches in the last year.
By Rich Hein | 02 April, 2014 08:51
On the 50th anniversary of the Big Iron, see how well you know this iconic computing workhorse
By Tim Greene | 28 March, 2014 09:08
Science fiction has a rich history of predicting the future. And in some cases, the future is now
By Glenn McDonald | 28 March, 2014 09:03
Sigh…I miss TweetDeck. Nevertheless, these apps are still very good indeed.
By Jon Gold | 28 March, 2014 08:59
Google beats spring cleaning rush, nixes apps and services
By Bob Brown | 20 March, 2014 08:30
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTIT Support EngineerNSW
- FTContent StrategistNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTOBIEE BI/DW ConsultantNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTDeliverability SpecialistNSW
Businesses and enterprises have quickly realised the power and efficiency of cloud computing, but migrating to the cloud can be a challenging process. This guide leads you through the three key steps you should take to assess your workload, select the most appropriate cloud model and ensure your cloud provider’s migration methodology stacks up.
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines
- Can you hear me now? NASA to test laser communication system