Appcelerator, whose Titanium platform is used to develop cross-platform apps for smartphones and tablets, has opened Open Mobile Marketplace, a store where developers can download modules to expand the functionality of Titanium and more easily add features to their apps, the company said on Monday.
A document listing all U.S. civilian nuclear sites became available on whistleblower Web site Wikileaks.org days after a government Web site publicly posted the data by accident.
Microsoft made Bing, its new "decision engine", publicly available yesterday with a background image of hot air balloons lifting off in the countryside on the Bing homepage.
Web searches using the terms "sex" or "sexual" from India on Microsoft's new search engine Bing receive a message that the search may return sexually explicit content and advises users to change search terms.
Netbooks made with the processors required to run Google's Android software will be on show at Computex Taipei 2009 this week from at least five or six companies, an executive from Arm Holdings said Monday.
Application security has become a critical component of all software development efforts. It includes all measures taken throughout the software development lifecycle to prevent programming flaws from being exploited. The flaws that creep in during the requirements, design, development, deployment, upgrades, or maintenance stages of applications become the basis of cyber attacks.
Current economic conditions are having a negative impact on the majority of security budgets, according to a survey conducted by CSO. Many respondents indicated hiring freezes or staff reductions were necessary due to the financial crisis.
Microsoft's SharePoint 2010 server is growing up, but may include too many capabilities for those users seeking to meet isolated or specific requirements, according to a study by Forrester Research.
Last July, the FBI executed what is arguably its most public campaign against hacktivists--individuals who breach computer systems to make a political or ideological statement. On Tuesday, July 19, the G-men c■ 12 men and two women allegedly associated with hacktivist group Anonymous for their supposed involvement in a dedicated denial of service (DDoS) attack against PayPal's website in December 2010.
While security professionals typically think of computer hackers, malicious insiders, naive employees, or the like as the greatest threat to an organization, I am quickly learning that arrogant lawyers can be the most devastating threat an organization can face. Frankly, the lawyers should be non-issues, but they can get their companies involved in things that should otherwise be avoided.
Augmented reality technology is getting a lot of attention these days -- particularly the use of AR with smartphones. The idea is that by using certain software, you can turn your iPhone, Droid or other smartphone into a virtual heads-up display. Aim your phone's camera at a shop, restaurant or landmark, and information about the place, such as hours of operation, reviews or directions, appears on the device's screen as graphics floating over the image of the place.
The University of British Columbia estimates it will cut its paper waste by 26 per cent and save at least $8 million over the next six years with a new initiative for improved document management and print services across some of its departments.
Carriers and aid workers are scrambling to rebuild communications in Haiti following the catastrophic Jan. 12 earthquake near the capital city of Port-au-Prince, which left many residents with no means of communicating inside or outside the country.
Whether it was his dressing in pumps and a skirt for the company's Halloween party or distributing bobble heads of himself, Dave Patzwald's IT department knew the change they were yearning for had come. "I inherited an IT department that was dispirited by rounds of outsourcing and canceled ERP projects. They weren't feeling respected or recognized," he says. "When I was hired three years ago, they pleaded with me: 'Dave, please just make this place fun again.'" And that's what he set out to do. More on CIO
The big talk in Washington's cybersecurity world is Melissa Hathaway's magical 60-day review, which is supposed to recommend how U.S. government cybersecurity efforts should be pursued. The technical press and lobbyists are all abuzz over whether or not there will be a cybersecurity coordinator who reports to the president. In certain circles, this is even more gossiped about than what Michelle Obama is wearing, but frankly the discussion is even less useful.
It's not shocking that many companies are scaling back, delaying or canceling IT projects. Recent Gartner survey data of 475 IT decision makers in global enterprises with 1,000 or more employees found that more companies are actually postponing or scaling back computing projects rather than canceling them outright.
Microsoft has not even released or confirmed next week's rumored release of its Kumo search engine, and already the industry is speculating what the new engine will or will not do, both in terms of functionality and for the company's search market share.
In the good old days of CRM, the software ran on your servers and needed heavy customization to really work with the rest of your business. The staffing decisions were pretty straightforward: There might be implementation consultants, but the system needed an ongoing team of your own staff. In one of these classic on-premise implementations I came across just last year, the CRM "permanent staff" was 1 development/operational person for every 100 users.
Mobile machine-to-machine (M2M) applications that don't involve human activities such as Web browsing or phone calls are a major focus of this week's Sprint Developer Conference in Santa Clara, California.
At several companies, data de-duplication, or single-instance storage, technology has demonstrated that it can cut long-term costs and improve disaster recovery. Yet only about 30% of companies worldwide have deployed some form of it to date.
If you've ever been to a large-scale SAP software demonstration or to a Sapphire show within the last 10 years, then you have likely witnessed the quick-witted antics of Ian Kimbell, SAP's self-proclaimed "Demo Boy."
Apple on Wednesday started selling its iPhone 3G online, the first time in a year that consumers have been able to get their hands on the device without making a trip to an Apple retail store or buying from AT&T.
Following layoffs and salary reductions unveiled earlier this year, Seagate now plans an additional 1,100 layoffs to bolster its cash flow and get earnings back in the black.
Nine of out 10 critical bugs reported by Microsoft last year could have been made moot, or at least made less dangerous, if people ran Windows without administrative rights, a developer of enterprise rights management software claimed Tuesday.