Monthly Archives: June 2014
Canopy Launches New PaaS, Joins Cloud Foundry Foundation
Canopy, a joint venture of EMC, VMware and Atos, announced its Canopy Cloud Fabric, a new enterprise platform-as-a-service (PaaS) offering.Canopy leverages the best of...
P.F. Chang’s Data Breach Underscores POS System Vulnerabilities
Chinese restaurant chain P.F. Chang's confirmed June 12 that it was the victim of a security compromise affecting its credit card payment terminals. The...
Samsung’s Super-thin Galaxy Tab S Fit for the Enterprise
Samsung's Super-thin Galaxy Tab S Fit for the Enterprise
by Michelle Maisto
Introducing the Samsung Galaxy Tab S
Ryan Bidan, senior director for Samsung Telecommunications America, took...
Daily Tech Briefing: June 13, 2014
IBM is opening new SoftLayer-based cloud data centers specifically for federal government workloads. They will feature IBM's SoftLayer infrastructure, which has been designed to...
Samsung Galaxy Tab S Combines Record Specs, Crucial Content
Samsung has introduced the Galaxy Tab S, a tablet and new flagship device with which it said it is "proudly putting our flag in...
OSGi Core Release 6 Now Available
The OSGi Alliance announced that the OSGi Core Release 6 Specification is available for download.The new specification enables developers to more easily extend the...
Tour the 12 World Cup 2014 Stadiums in Brazil With Google Street View
Tour the 12 World Cup 2014 Stadiums in Brazil With Google Street View
by Todd R. Weiss
São Paulo
In Arena de São Paulo (Arena Corinthians) in...
Intel Says Business PC Demand Stronger Than Expected
Intel officials are seeing strong demand for business PCs, a trend that is driving their financial forecast for the quarter and the year higher.The...
E3 2014: Console Makers Providing Entertainment Beyond Pure Gaming
E3 2014: Console Makers Providing Entertainment Beyond Pure Gaming
By Don Reisinger
Bring On the Sony PlayStation TV
Sony at its press conference showed off the PlayStation...
Database Monitoring Key to Reducing Security Breaches
Continuous monitoring of database networks is the best approach to avoid breaches such as the high-profile attacks against Target, Michaels and other U.S. retailers,...