- Akamai admits its OpenSSL patch was faulty, reissues keys
- Google updates terms of service to reflect its scanning of users' emails
- Glass all gone after one-day sale, Google says
- How to fix the two-factor authentication log-in error in Gmail on Android
After dragging its feet for months, Apple is finally making good progress on a court-ordered antitrust compliance program related to the U.S. Department of Justice's e-book price-fixing case against the company, an external monitor said.
By Grant Gross | 16 April, 2014 01:00
U.S. businesses can share most cyberthreat information with competitors without facing antitrust enforcement action, two U.S. enforcement agencies said Thursday.
By Grant Gross | 11 April, 2014 05:36
The proposed US$45.2 billion acquisition of Time Warner Cable by Comcast would give the company huge market power to determine broadband prices and Internet content, a group of U.S. senators said Wednesday.
By Grant Gross | 10 April, 2014 04:32
Cable giant Comcast has fired up its messaging machine to promote its proposed US$45.2 billion purchase of fellow cable television and broadband provider Time Warner Cable, arguing the deal will benefit Time Warner's broadband customers.
By Grant Gross | 09 April, 2014 05:55
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
By Grant Gross | 20 December, 2013 16:11
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
By Grant Gross | 07 November, 2012 19:06
With the U.S. presidential election on Tuesday, it's fair to say that technology policy hasn't risen to the top of the agenda in the debate between President Barack Obama and Republican challenger Mitt Romney.
By Grant Gross | 02 November, 2012 17:37
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTOBIEE BI/DW ConsultantNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTIT Support EngineerNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTDeliverability SpecialistNSW
If your business has plans that include aggressive growth and aspires to be a best-in-class organization, your IT systems and applications need to be up to the task. Homegrown solutions or outdated software can hamper the execution of your strategic vision. If your IT infrastructure and maintenance costs are affecting your ability to stay competitive, then a cloud-based enterprise resource planning (ERP) suite is well worth exploring. This eBook explores the core components of a cloud-based ERP solution that delivers enterprise-class software without sacrificing functionality or changes to business processes and with no additional cost for infrastructure and complicated integrations.
- Google revenue jumps 19 percent but still disappoints
- AT&T wearables to hit the smartwatch runway soon
- Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test
- Automakers show off in-vehicle Wi-Fi, new smartphone interfaces
- Court rejects Lavabit appeal, cites improper procedural handling
- Connecting for Good wrestles Kansas City's digital divide
- Chrome users won't give up, keep pressing Google to restore old-style new tab page
- Still deploying 11n Wi-Fi? You might want to think again
- Can Heartbleed be used in DDoS attacks?
- Google opens the floodgates for new 'social' ads
- Net neutrality ruling complicates US transition to IP networks
- Lavaboom builds encrypted webmail service to resist snooping
- Teardown: Galaxy S5 parts cost 21% more than iPhone 5S
- Oracle identifies products affected by Heartbleed, but work remains on fixes
- Developers get access to more Sony camera features