Monthly Archives: February 2015
Tech IPOs Remain a Major Driver of Business in 2015
Technology initial public offerings (IPOs) continued to remain a key market driver and reached their highest levels since the dot com era, according to...
Facebook Grows Bug-Bounty Payouts in 2014
Facebook's security got a significant boost in 2014, thanks to the efforts of researchers who reported flaws to the social networking giant.Facebook reported the...
HP in Talks to Buy Aruba Networks
Hewlett-Packard reportedly is looking to boost its networking business by acquiring wireless networking vendor Aruba Networks.Citing people with knowledge of the matter, Bloomberg reported...
Apple Must Pay $532.9M in iTunes Patent-Infringement Verdict
Apple has been ordered by a federal jury in Texas to pay $852.9 million to Smartflash LLC to compensate the company for infringing on...
Dell Unveils New Set of Converged Storage Appliances
Dell is walking the walk when it comes to data center convergence. Not only is it busy converging more functionality into smaller-footprint servers and...
Microsoft Has Health Care Hopes With Revolution Analytics Buy
A month after Microsoft announced that it was acquiring Revolution Analytics, a Mountain View, Calif.-based R programming language specialist, the company is signaling that...
Broadcom, TI Platforms Aim to Extend Wearable Battery Life
Chip makers Broadcom and Texas Instruments are introducing platforms designed to reduce the power consumption in smartwatches and other connected devices.Broadcom on Feb. 25...
SSL Problems Plague Many Mobile Apps: Intel Report
There continues to be a lack of proper Transport-Layer Security for mobile apps, according to Intel Security, which published a new report on Feb....
Microsoft Releases Second Wave of Garage Mobile Apps
Microsoft Garage, the software giant's cross-platform consumer mobile app initiative, wants to help Windows Phone users quickly connect to conference calls and spend less...
Five Things Hackers Are Doing With Victims’ Data in 2015
Five Things Hackers Are Doing With Victims' Data in 2015
by Darryl K. Taft
Blackmailing
Blackmailing a corporation or individual for access to data or private information...