Monthly Archives: August 2013
Synoptek Buys Managed IT Services Business From FusionStorm
FusionStorm, a provider of IT consulting, technology solutions and cloud and managed services, announced it is selling off its managed IT services and cloud...
Guide to IP Booter Panels in 2021
A security researcher speaking at the Black Hat conference last week has exposed the malicious underworld of Booter services that offers paying customers distributed...
HP Sees Interest From Apple, Others in Moonshot Servers: Report
Hewlett-Packard reportedly is receiving interest in its low-power Project Moonshot microservers from a number of big-name companies, including Apple.At the same time, Chile’s largest...
Samsung Win Over Apple Deflated by Obama Administration Ruling
Samsung won a major courtroom victory over Apple on June 4, when the U.S. International Trade Commission (ITC) ruled in favor of Samsung, putting...
Microsoft Drops Surface Pro Tablet Price on Heels of Surface RT Cuts
With technology giant Microsoft struggling mightily to gain a foothold in a tablet market dominated by Apple's iPad devices and a slew of low-cost...
SaaS Contract Ambiguity Raises Security Concerns: Gartner
Software-as-a-service (SaaS) contracts often have ambiguous terms regarding the maintenance of data confidentiality, data integrity and recovery after a data loss incident, which leads...
FrontRange Introduces Change Management Application for EHRs
As companies continue to implement the government's meaningful-use incentive program for electronic health records (EHRs), FrontRange has introduced what it calls a change-management application...
Do-It-Yourself Eavesdropping System Highlights Weak Mobile Security
LAS VEGAS—A computer-security researcher warned mobile-device users that spies do not need the sweeping government powers of the National Security Agency to track their...
Google Maps Feature Butterflies, English History, San Francisco Hills
What do monarch butterflies, history in Portsmouth, England, the soaring hills in San Francisco and the home towns of current Major League Baseball and...
Industrial Infrastructure Vulnerable to Remote Tampering: Black Hat
LAS VEGAS—Industrial control infrastructure that is used to monitor and manage devices and sensors can be remotely exploited, potentially leading to a cataclysmic failure,...