Monthly Archives: February 2015

Linux kernel contributors

A Quick Look at Eight Recent Linux Kernel Releases

0
A Quick Look at Eight Recent Linux Kernel Releases by Sean Michael Kerner Average Kernel Development Cycle Is 66 Days The Linux Foundation report looked at eight...
LG

LG Unveiling LG Watch Urbane, an All-Metal Luxury Smartwatch

0
LG has announced LG Watch Urbane, an all-metal smartwatch with a leather wristband and classic round watch face that's aimed at fashion-conscious luxury goods...
Hadoop logo

IBM Bolsters Hadoop Offerings

0
IBM has upgraded its BigInsights big data portfolio with new support for machine learning, the R programming language and more.With the release of IBM...

Google Releases New Security Scanner on Its Cloud Platform

0
With cloud-deployment security a major concern for virtually all software developers, Google on Feb. 19 released to beta testing a new security-leak scanner for...
data center

HP Joins Dell, Juniper in Offering Open Network Switches

0
Hewlett-Packard is the latest networking vendor to offer open switches that can run operating systems from other vendors.HP is joining the likes of Dell...
small business and social media

Small Businesses Optimistic, but Access to Cloud Will Be Key

0
Three out of four small-business owners in the United States are optimistic about growth in 2015, according to an online survey of 500 small-business...
mobile apps and apigee

Mobile Devices, Apps Prove Addicting for U.S., U.K. Users

0
A majority of smartphone users admit to checking their devices nearly all the time, including while dining with others. More than half of users...
saama and data analytics

Saama Debuts Fluid Analytics Engine

0
Saama announced new analytics technology that includes a set of more than 3,000 algorithms to support data science plus a varied set of templates...
Google

Russian Search Firm Accuses Google of Anti-competitive Practices

0
Google's enormous Internet footprint and influence have increasingly made it the target of numerous disputes overseas involving antitrust matters as well as free speech,...
Equation Spyware 2

Equation Group Spyware Poses Threats Far Beyond Its Original Purpose

0
Think of the GrayFish malware as being something like Ebola for computers. Like Ebola, this malware only spreads through direct contact, it can infect...