HomeLatest News

Latest News

Apple Accuses Samsung of Copying Even Application Icons

In an effort to make its patent case against Samsung as strong as possible, Apple brought forth a graphic designer as a witness to...

Microsoft Has Strong Reasons to Induce Users to Adopt Windows 8 Tiled UI

Tech news Websites and blogs have been buzzing the last few days with news that Microsoft is going to block Windows 8 users from...

AMD’s New FirePro Chips Offer Integrated CPU, Graphics

Advanced Micro Devices is rolling out new FirePro chips that integrate both discrete-level graphics capabilities with a CPU, similar to the processors the company...

Security Experts Debate Shifting From Defensive to Offensive Tactics

A few weeks ago at the Aspen Security Forum, Gen. Keith Alexander, National Security Agency director, said the number of attacks against America's critical...

Samsung and Apple Captured 108 Percent of Smartphone Profits in Q2: Report

So great is Apple and Samsung€™s dominance over the rest of the smartphone market that the pair together captured 108 percent of the handset...

NASA Mars Rover Landing Empowered by Dell Systems

Dell announced that its systems supported the landing of NASA's new Mars rover Curiosity.Dell systems played a key role in the most complicated portion...

Enova Launches Enigma USB Data-Encryption Platform

Hardware-based cryptographic solutions provider Enova Technology announced the launch of the Enigma module, a USB encryption solution for enterprises, offering real-time full-disk encryption for...

Social Media Expectations Should Influence Businesses: Gartner

The rise of social media platforms like Facebook, Twitter and others means businesses run the risk of irritating customers, who are becoming used to...

iPhone, iPad Connect Ford Sync AppLink Platform to Allergy App

Allergy symptoms will be on the radar for drivers with an iPhone or iPad. Ford Motor Co. has added IMS Health's Allergy App to...

Ransomware, a Quick-and-Dirty Bribery Scam, Targets Europe

By: Robert LemosA typical digital kidnapping often begins with the victim inadvertently running a malicious program. The ransomware, as such programs are called, then...