Activists push Facebook to abandon its real-names policy

Activists are meeting with Facebook officials Wednesday, challenging the company's real-names policy and other rules they say violate free-speech rights, sense of identity and safety.

By Zach Miners | 02 October, 2014 04:02

Tags: Internet-based applications and services, legal, social networking, internet, social media, Facebook

ARM builds an OS for the Internet of Things

Chip design company, ARM, is stepping outside its area of expertise to release a new operating system that could play a big role in building out the Internet of Things.

By James Niccolai | 02 October, 2014 03:58

Tags: Arm Holdings, Components, processors

3D vendor sells $1,500 part to make metal guns

Cody Wilson, the developer of the world's first fully 3D-printed plastic gun, is preparing to sell a consumer-grade machine that can make metal guns.

By Lucas Mearian | 02 October, 2014 03:49

Tags: 3d printing, Arduino, Defense Distributed, industry verticals

IT pros should pay attention to 'shadow IT,' Interop NY keynoters urge

Interop New York speakers opened the conference with a provocative message: Instead of ignoring "shadow IT" in their organizations, IT pros should try to understand what they are failing to deliver that workers wind up taking care of themselves.

By Joab Jackson | 02 October, 2014 03:29

Tags: software, Hewlett-Packard

Don't laugh: Jimmy Kimmel Most Dangerous Cyber Celebrity of 2014

Late night talk show host Jimmy Kimmel doesn't fit the profile of McAfee's usual Most Dangerous Cyber Celebrity, most often in recent years a female celebrity whose online images can frequently lure Web surfers to sites rife with spyware, viruses and other malware.

By Bob Brown | 02 October, 2014 03:26

Tags: Apple, mcafee, security, phishing, entertainment, malware

After a long road to the server market, ARM CEO Segars looks ahead

After suffering a series of setbacks on the way to getting 64-bit ARM servers into the hands of users, company CEO Simon Segars prefers to take a fresh look at market opportunities instead of dwelling on the past.

By Agam Shah | 02 October, 2014 03:20

Tags: Arm Holdings, Components, processors

FCC: Some TV stations could earn huge dollars in spectrum auction

Some U.S. television stations could make tens, or even hundreds, of millions of dollars by giving up their spectrum so that the U.S. Federal Communications Commission can sell it in an upcoming mobile broadband auction.

By Grant Gross | 02 October, 2014 02:57

Tags: 3g, telecommunication, 4g, Tom Wheeler, regulation, U.S. Federal Communications Commission, government, mobile

Hurry! Wait! Go! Joomla stumbles with patch for serious vulnerability

The Joomla project pushed out new updates for its popular content management system Wednesday after a glitch was found in the high-priority security patches it released a day before.

By Lucian Constantin | 02 October, 2014 02:48

Tags: patches, security, joomla, Akeeba, patch management, Exploits / vulnerabilities

Microsoft weaves around Office bloat complaints with Sway authoring tool

Reacting to chronic complaints that Office applications have become unwieldy with endless menus and features, Microsoft is developing a streamlined presentation application built from the ground up for mobile devices and cloud computing.

By Juan Carlos Perez | 02 October, 2014 02:05

Tags: applications, Microsoft, software, Office suites

Google bows to pressure, removes news snippets from German search results

In a move to minimize legal risks, Google has stopped showing news snippets and thumbnails for some well-known German news sites in search results.

By Loek Essers | 02 October, 2014 00:50

Tags: Google, copyright, VG Media, intellectual property, legal, Civil lawsuits

OpenVPN servers can be vulnerable to Shellshock Bash vulnerability

Virtual private network servers based on OpenVPN might be vulnerable to remote code execution attacks through Shellshock and other recent flaws that affect the Bash Unix shell.

By Lucian Constantin | 02 October, 2014 00:15

Tags: patches, security, Access control and authentication, Amagicom, Exploits / vulnerabilities

Satellite radar measurements map the seafloor

An international team of scientists have created a map of the seafloor using satellite radar measurements of ocean surfaces.

By Rebecca Merrett | 02 October, 2014 00:01

Tags: spatial mapping, seafloor map, spatial map, big data, Satellite radar beams

Apple delivers OS X Yosemite 'golden master' to devs

Apple on Tuesday released a "golden master" of OS X Yosemite to developers, signaling that the upgrade is on track to ship within the next three weeks.

By Gregg Keizer | 01 October, 2014 23:38

Tags: Apple, Mac OS X, software, Yosemite

Alcatel-Lucent sells enterprise networking unit to China Huaxin

Alcatel-Lucent has closed the sale of its IP telephony and Ethernet switching equipment activities to China Huaxin. The spun off company will struggle to compete with the likes of Microsoft and Cisco Systems, and will have to make acquisitions of its own to grow.

By Mikael Ricknäs | 01 October, 2014 22:16

Tags: business issues, China Huaxin, alcatel-lucent, Networking, Mergers and acquisitions

Hacked celebrities 'dumb', says proposed EU digital commissioner

Günther Oettinger, the European Union's proposed Commissioner for the Digital Economy and Society, gave a disappointing performance at his confirmation hearing, dodging questions and calling the victims of a recent data breach "dumb."

By Loek Essers | 01 October, 2014 21:35

Tags: security, european commission, government, European Parliament, privacy

Twitter Feed

Featured Whitepapers