The problem with Twitter has always been monetization: Ads don't pull in the revenue needed to maintain the social network, and it doesn't have Facebook's pull to entice developers to build on top of the platform. But no more -- or at least so Twitter hopes.
By Matt Weinberger | 23 October, 2014 05:38
Google is taking another crack at email overload, but this time around it's resorting to drastic measures, developing a new product apparently built from scratch without relying on Gmail.
By Juan Carlos Perez | 23 October, 2014 05:33
Microsoft is continuing its crusade to get CIOs interested in Windows 10, touting new security features that include two-factor authentication built directly into the OS.
By Juan Carlos Perez | 23 October, 2014 05:25
After three years in stealth, an Andreessen Horowitz-backed startup named Bracket Computing launched a new computing system today that aims to make the public cloud more palatable for security-sensitive enterprises.
By Brandon Butler | 23 October, 2014 05:14
The U.S. Federal Communications Commission should reclassify broadband as a regulated public utility in order to achieve net neutrality, but take a "light touch" while doing it, a U.S. lawmaker said Wednesday.
By Grant Gross | 23 October, 2014 04:45
Malicious advertisements made their way last week to almost two dozen popular websites and used browser-based exploits to infect computers with CryptoWall, a nasty file-encrypting ransomware program.
By Lucian Constantin | 23 October, 2014 04:40
Getting out of the business of designing and running computer systems, German airline Deutsche Lufthansa AG is selling its IT services division to IBM and having Big Blue run its internal IT operations.
By Joab Jackson | 23 October, 2014 04:27
As it fights to remain a leader in enterprise social networking (ESN) among giant rivals, pure-play vendor Jive Software has been furiously integrating its suite with the most popular business software, now adding the Google Docs productivity applications.
By Juan Carlos Perez | 23 October, 2014 03:11
With smartphones and sensors putting more demand on servers and other back-end gear, chip design company ARM is introducing new interconnect technologies that will help shuttle the data around more quickly.
By Agam Shah | 23 October, 2014 03:01
Apple has told browser users to pay attention to warnings of insecure digital certificates after reports of a "man-in-the-middle" attack against iCloud.com in China was revealed earlier in the week.
By Gregg Keizer | 23 October, 2014 02:55
As much as the Internet provides a place to connect, it's also a haven for trolls, bullies, cyberthieves and wackos. Recent incidents targeting women, including GamerGate and the iCloud nude photo leak, have brought some of the issues to the fore.
By Zach Miners | 23 October, 2014 00:47
EMC has confirmed it will purchase the bulk of Cisco's stake in VCE, the companies' joint venture in converged infrastructure products.
By Chris Kanaracus | 23 October, 2014 00:46
Amazon Web Services wants to become a more central part of enterprise IT with the AWS Directory Service, which both competes and integrates with Microsoft's Active Directory.
By Mikael Ricknäs | 23 October, 2014 00:45
A malicious Android app that takes over the screen of devices and extorts money from users with fake notifications from law enforcement agencies was recently updated with a component that allows it to spread via text message spam.
By Lucian Constantin | 22 October, 2014 23:16
If its bite-controlled iPhone app is any indication, gum maker Lotte wants music to be chewable.
By Tim Hornyak | 22 October, 2014 22:46
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
- Canonical celebrates cloud freedoms with new Ubuntu
- Apple and sapphire supplier strike deal to end partnership
- Collection of new cord cutting techs make it easier to snip that CATV tether
- Microsoft exec opens up about Research lab closure, layoffs
- Facebook and Yahoo prevent use of recycled email addresses to hijack accounts
- Facebook hopes to get people talking -- using whatever name -- with Rooms app
- Google teams with Oxford on artificial intelligence
- 5K Retina iMac supply tightens
- Amazon Web Services opens German location to ease privacy concerns
- Akamai sees record-setting spikes in size and volume of DDoS attacks
- Amazon launches German cloud region in nod to privacy concerns
- Researchers use silicon to push quantum computing toward reality
- Wearable health devices are a novelty that wear off
- German publishers capitulate and let Google post news snippets -- for now
- Abandoned subdomains pose security risk for businesses