Monthly Archives: February 2016
IBM Buys Aperto, Takes Watson to India
Less than a week after agreeing to acquire Resource/Ammirati, IBM today announced it has signed a definitive agreement to acquire Aperto, another digital marketing...
AMD Unveils Virtualized GPUs, New Quiet Chips
Advanced Micro Devices is continuing a steady drumbeat of product releases as officials look to make the chip maker a larger player in everything...
Streaming Music’s Success Pushes RIAA to Change Award Policies
The soaring success of streaming music audio and video online is causing the Recording Industry Association of America (RIAA) to now include on-demand audio...
Microsoft Extends Office 365 FastTrack Service to More SMBs
Large corporate accounts are Microsoft's bread and butter, but the IT heavyweight isn't overlooking small and midsized businesses (SMBs) in its quest to be...
Microsoft HoloLens to Drive Consumer Smart Glasses Demand: Juniper
HoloLens, Microsoft's Windows 10-powered augmented-reality headset, isn't on the market yet, but expectations are already building.IT analyst firm Juniper Research released a forecast today...
Tails 2.0 Linux Distro Improves Installation, Gets New Look
Tails 2.0 Linux Distro Improves Installation, Gets New Look
The first major milestone release for the privacy-focused Linux distribution in 2016 makes it easy for...
DDoS Attack Size Soars, Volumes Are Up, Arbor Networks Finds
DDoS Attack Size Soars, Volumes Are Up, Arbor Networks Finds
Distributed denial-of-service attacks continue to grow in bandwidth volume, as attackers make use of different...
Samsung Rumored to Soon Unveil Gear 360 Virtual Reality Camera
Samsung will debut its recently rumored Gear 360 virtual reality camera at its Galaxy Unpacked 2016 gala Feb. 21 at Mobile World Congress in...
Google Patches 13 Flaws in February Android Update
Google has come out with its second security patch update for Android in 2016, this time patching 13 vulnerabilities in the mobile device operating...
Fisher-Price Smart Teddy Bear Latest IoT Toy Under Hacker Scrutiny
When it comes to the emerging Internet of things world, security vulnerabilities can exist almost anywhere, including in a child's teddy bear. Security vendor...