Monthly Archives: December 2011

LightSquared Presses FCC on Wireless Spectrum Rights

0
Wholesale-only nationwide 4G Long-Term Evolution network operator LightSquared asked the Federal Communications Commission to confirm the company's right to use the spectrum licensed to...

Facebook, Twitter Lead Social Networking Growth: comScore

0
Social networking accounted for nearly 1 in every 5 minutes spent online globally in October 2011, ranking as the most engaging online activity worldwide....

Custom-Built Cloud Solutions, Apps Gain Traction

0
When it comes to creating new applications or software to solve business problems, a growing number of employees are going it on their own,...

Sony Xperia Starting Ice Cream Sandwich Upgrade in March

0
Sony Ericsson reaffirmed that it will begin upgrading its 2011 Xperia smartphones to Google's (NASDAQ:GOOG) Android 4.0 Ice Cream Sandwich platform in March or...

Firefox For Android Tailored for Tablets

0
Anyone out there like to use Firefox on devices other than their work or home PCs?Firefox for Android, which has 5 million to 10...

Schneider Electric Acquires Viridity to Increase Power Management Offerings

0
Schneider Electric is acquiring Viridity's EnergyCenter 2.0 platform, aiming to provide data center managers complete visibility over IT and facility operations, especially when it...
1

In Memoriam: 17 Tech Pioneers Who Died in 2011

0
In Memoriam: 17 Tech Pioneers Who Died in 2011 Steve Jobs, Founder of Apple Steve Jobs, founder of Apple, passed away Oct. 5 after an eight-year...
1

Santa GPS (99 cents)

0
Santa GPS (99 cents) Track Santa in real time as he flies around delivering gifts to all the good people. It may keep your kids...

Microsoft, Nokia Wouldn’t Have Benefited From Acquiring RIM

0
Microsoft and Nokia apparently played with the idea of purchasing Research In Motion, according to a recent piece in The Wall Street Journal.That report...
1

SQL Injection

0
SQL Injection Arguably one of the easier attacks to prevent, SQL injection is also the most common software bug in applications. Attackers enter database commands...