Next week Apple will spill the beans on the iPad 2, which can only mean one thing: It's time to start focusing on the iPhone 5 -- which will (probably) be announced in June.
By Paul Suarez | 28 February, 2011 02:16
In a sign that hackers, like everyone else, are taking an interest in everything Apple, researchers at Sophos say they've spotted a new Trojan horse program written for the Mac.
By Robert McMillan | 26 February, 2011 13:30
It's been a few years coming, but it looks like China may finally be getting a handle on its spam problem.
By Robert McMillan | 26 February, 2011 13:28
Can libraries continue their role as lenders when books are in digital form? While library executives are set on the idea, at least some book publishers seem to still be wary of having libraries circulate electronic copies of their books to multiple parties, even with controls in place.
By Joab Jackson | 26 February, 2011 09:10
T-Mobile USA suffered a net loss of 23,000 customers in the fourth quarter but gained 1 million smartphone users, which helped to increase the data revenue that the carrier pulled in from an average subscriber.
By Stephen Lawson | 26 February, 2011 07:49
Repeating what has been a familiar pattern for the past six months, tech earnings and market forecasts this week show that while enterprise IT sales, especially for software, are booming, consumer demand for PCs is flagging.
By Marc Ferranti | 26 February, 2011 05:02
A Swiss court is considering a request from the country's data protection commissioner that Google should manually blur people's faces in its Street View imagery application rather than use automated technology.
By Jeremy Kirk | 26 February, 2011 02:56
Intel wants the cloud to be a bit smarter.
By James Niccolai | 26 February, 2011 02:23
Google has made a significant change to its search engine that will push further down in its rankings websites that pilfer content from other places on the Internet or do not offer high-quality information, the company said in a blog post on Thursday.
By Jeremy Kirk | 26 February, 2011 01:27
With the launch of CloudFormation, Amazon Web Services (AWS) is hoping to make it easier for enterprises to put together stacks of applications and resources for its cloud computing service, the company said on Friday.
By Mikael Ricknäs | 25 February, 2011 21:55
Major handset makers meeting on Friday in Taipei gave their nod to a final version of the world's first advanced LTE mobile data standard, which will raise transfer speeds to 1Gbps.
By Ralph Jennings | 25 February, 2011 19:19
Chinese telecommunications equipment supplier Huawei wants to clear its reputation and has asked the U.S. government to investigate the company for concerns that it poses a national security risk.
By Michael Kan | 25 February, 2011 19:08
PayPal has lifted a temporary restriction placed on the account of Courage to Resist, a group raising funds to support the legal defense of U.S. Army Pfc. Bradley Manning, who was arrested for allegedly downloading classified information and providing it to the WikiLeaks whistle-blowing website.
By Dan Nystedt | 25 February, 2011 15:55
It looks like all those rumors about a MacBook Pro refresh coming Thursday instead of in early March are true. The online version of the Apple Store was down this morning and, just in time before the big reveal, a photo has leaked online showing the specs for the new 15-inch version of the refreshed MacBook Pro.
By Ian Paul | 25 February, 2011 01:42
Microsoft said a "technical issue" is to blame for the recent Windows Phone 7 software update problems that have bricked about 10 percent of devices trying to upgrade. The update snafu mostly appears to be affecting Samsung devices. Microsoft hasn't said what, specifically, caused the problems, but it has stopped upgrades to Samsung handsets as a precaution. Updates are continuing normally for non-Samsung phones.
By Ian Paul | 25 February, 2011 03:08
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- FT.Net Solution ArchitectNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCMobile iOS DeveloperNSW
- CCFront End Web Developer (Drupal)NSW
- CCMobile Designer / Developer - IOSNSW
- CCMobile Designer / Developer - IOSNSW
- FTSenior SQL DBANSW
- CCSenior Systems EngineerNSW
- CC.Net Solution ArchitectNSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCDBA (Oracle/SQL)NSW
- CCSenior Release EngineerNSW
- FTApplication Support SpecialistNSW
Over the past several years, we’ve seen business requirements rapidly evolve and technologies continue to advance, yet the way many companies approach disaster recovery remains at a standstill. Tolerance for downtime is at an all-time low, and many organizations — and particularly their users — expect IT services to be “always-on.” Meanwhile, new virtualization and automation technologies have emerged that can help fill gaps in continuity plans, but many organizations have been slow to adopt them, thus widening the gap between business expectations and IT realities.
- 'Largest DDoS attack' in GitHub's history targets anticensorship projects
- FCC will vote next month on plan to share valuable 3.5GHz spectrum
- Intel could strengthen its server product stack with Altera
- Kleiner Perkins cleared of sex discrimination against Ellen Pao
- Facebook reveals the logic behind its forced Messenger split
- French self-driving car goes for a spin around Paris monument
- Google to bring imaging, sensor technology to the operating room
- 5 freshly-funded cloud computing companies worth watching
- Why Meerkat and Periscope are the next big challenge for marketers
- USB Type-C peripherals are on the way, and storage devices are first up
- Microsoft should forget the Surface, stick to the Pro 2-in-1 line
- Slack hacked, compromising users' profile data
- Congress moves quickly on cyberthreat information sharing
- New mobile-malware detection technique uses gestures
- Google Cloud Launcher deploys VM-based apps in a snap