Monthly Archives: December 2014
North Korea’s Internet Still Unstable, Following U.S. Accusations
A moderate-sized denial-of-service attack has disrupted North Korea's Internet service, making government and university Websites largely unavailable for the past 24 hours, but security...
Windows 8.1 Rules Microsoft’s App Marketplace
Microsoft is offering up its latest Windows Store statistics as proof of Windows 8.1's popularity, at least compared with its predecessor."Windows 8.1 is now...
Microsoft Launches PlayReady Encrypted Live Streaming
Microsoft has flipped the switch on a new digital rights management (DRM) option for live video streams on the company's cloud streaming solution, Azure...
HP Sees NFV as a ‘Huge Opportunity’
Hewlett-Packard is bullish on the future of the cloud and on network functions virtualization (NFV). Helping to lead HP's NFV and cloud efforts is...
10 Things to Expect From the Cloud Hosting Sector in 2015
10 Things to Expect From the Cloud Hosting Sector in 2015
by Chris Preimesberger
Pricing for Usage Becomes More Granular
While not all cloud-based services bill alike,...
10 iPhone 6, 6 Plus Enterprise Apps to Keep You Productive on the Go
10 iPhone 6, 6 Plus Enterprise Apps to Keep You Productive on the Go
by Don Reisinger
TurboScan Creates Multipage PDFs in No Time
TurboScan is one...
Mobile Shopping Experience Could Improve, Consumers Say
More than half (54 percent) of consumers say retailers only "meet expectations" or "inconsistently meet expectations" when asked about brands' use of technology throughout...
Online Attacks Impact Majority of Businesses
The growing number of flaws in Web browsers is viewed as the biggest endpoint security headache by today's IT decision-makers, according to a survey...
Paragon Software Updates Home Backup and Recovery Tool
Data protection, backup and disaster recovery specialist Paragon Software Group announced the launch of Backup & Recovery 15 Home, a user-friendly data and PC...
Four Flaws Expose Critical Network Time-Keeping Servers to Attack
Four security vulnerabilities in a popular program for synchronizing time on Internet-connected computers could be used to compromise tens of thousands — and possibly...