- Glass all gone after one-day sale, Google says
- Akamai admits its OpenSSL patch was faulty, reissues keys
- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
twitter in pictures
Aiming to play a bigger role in analyzing tweets and sharing the resulting insights with advertisers and other businesses, Twitter has acquired Gnip, its partner for the past few years.
By Zach Miners | 16 April, 2014 04:51
Twitter was not affected by the Heartbleed Internet vulnerability that rocked the Web security world this week, making one less password consumers need to change to protect themselves, but users still need to be careful how they respond to the threat.
By Stephen Lawson | 10 April, 2014 11:02
Real-time chatter about television abounds on Twitter, offering a potentially lucrative opportunity for advertising. The social network is looking to make the most of it, announcing a series of deals Monday to better monetize tweets about TV shows around the world.
By Zach Miners | 01 April, 2014 12:21
Sigh…I miss TweetDeck. Nevertheless, these apps are still very good indeed.
By Jon Gold | 28 March, 2014 08:59
When I signed up for a Twitter account in the summer of 2009 I spent some time thinking about whether or not I should protect my tweets. As a novice Twitter user, I had to decide whether the benefits of protecting my tweets outweighed the drawbacks. Looking back, I do not regret my decision to protect my tweets, and I'll tell you why.
By Phil Shapiro | 23 February, 2011 09:14
Twitter may have become a household name, but it remains a mystery to many people. Perhaps even most people. For the next few days, I'm going to put on my teacher's cap and show you how to set up a Twitter account, how to put that account to good use, and how to read your incoming "tweets" (i.e. messages) from just about anywhere.
By Rick Broida | 08 April, 2010 02:59
Yesterday you learned how to access your Twitter account on the run. Ah, but what about at the office? What if you can't get a good cell signal at your desk? And what if the big bosses block your browser from connecting to Twitter? How will you tweet? HOW?!
By Rick Broida | 10 April, 2010 06:02
Analysts are pondering just what Microsoft might do with the Android-variant smartphone Nokia has under development: Keep it or kill it.
By Matt Hamblen | 12 December, 2013 18:13
Politics collided with the world of technology this year as stories about U.S. government spying stirred angst both among the country's citizens and foreign governments, and the flawed HeathCare.gov site got American health-care reform off to a rocky start. Meanwhile, the post-PC era put aging tech giants under pressure to reinvent themselves. Here in no particular order are IDG News Service's picks for the top 10 tech stories of the year.
By Marc Ferranti | 09 December, 2013 19:51
Whitepapers about twitter
The growth in social media has overwhelmed many marketers. Things are moving so fast that many brand managers stay busy keeping tabs on the latest developments and trends, with little time to look at the mix of social media being put into the market. This whitepaper provides a step-by-step guide for determining your strategy, and the proper mix or marketing channels - in social media.
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTIT Support EngineerNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTContent StrategistNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTOBIEE BI/DW ConsultantNSW
- FTDeliverability SpecialistNSW
Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
- AMD's profitability streak ends at two quarters
- Netcraft tool flags websites affected by Heartbleed
- Israeli start-up, working with GE, out to detect Stuxnet-like attacks
- Facebook wants to help you meet friends offline
- Tor anonymity network to shrink as a result of Heartbleed flaw
- For Red Hat, it's RHEL and then...?
- Report: Oracle pushes back against Oregon officials over troubled health care site
- Google Glass to get a workout from Dutch firefighters
- Nokia doesn't want you to get shocked, suspends tablet sales because of faulty charger
- Facebook users targeted by iBanking Android trojan app
- Samsung and Amazon customize Kindle app, offer free e-books
- Microsoft extends Windows 8.1 Update migration deadline for business
- With Google Glass, the doctor can see you now
- Ruggedized scientific calculator perfect for extreme math
- TSMC benefits from demand for high-tech smartphone chips