Search Results

Results 981-1000 of 1986 for John P. Mello Jr.
SPOTLIGHT ON SECURITY

Big Data Analytics Fights Insider Threats

Cyberdefenders for years have adopted Fort Apache strategies to protect their networks. Strong perimeters could prevent attackers from reaching precious data, they reasoned ...

Swiftkey’s Clarity Keyboard Puts Auto-Correction in Context

Most auto-correction programs correct mistakes as you make them. They even predict words for you as you type. Swiftkey's recent release for Android,Clarity Keyboard Beta, corrects mistakes -- up to several at a time -- after you've typed them ...

Watch Band Guidelines Good News for Apple Accessory Makers

Apple on Tuesday released some guidelines that may deliver a charge to the accessory market for its Apple Watch ...

SPOTLIGHT ON SECURITY

Report: Top Endpoint Security Packages Perfectly Foil Drive-By Attacks

Drive-by attacks on the Internet are a particularly pernicious form of online threat, especially for individual Web surfers. On the corporate level, though, a company with good endpoint protection software can foil the malicious practice ...

Adobe Adds Dazzle to Lightroom

Adobe's recently launched new version of Lightroom for its Creative Cloud Photography platform improves performance of the photo manager and adds new HDR, panorama and facial recognition features ...

Faulty Taptic Engine Could Make Apple Watch Rollout Sputter

A production snag in making the component that provides tactile feedback in the Apple Watch could impact its availability in coming weeks ...

SPOTLIGHT ON SECURITY

Apple Watch Could Be a Password Alternative

With password tolerance levels at an all time low, alternatives to the pesky and insecure authenticators are beginning to abound. One of those alternatives could be the Apple Watch ...

Other Shoe Drops in White House Security Breach

Last year's breach of unclassified White House computer systems was far more intrusive than initially thought and included the theft of some presidential correspondence, The New York Times reported Friday ...

House Passes Cybersecurity Bills Despite Privacy Fears

Two cybersecurity bills approved this week by the U.S. House of Representatives pose a threat to citizens' privacy, according to opponents of the measures ...

SPOTLIGHT ON SECURITY

Breach Outbreaks Fuel Encryption Adoption

As data breaches make headlines around the world, more companies are turning to encryption to protect their information jewels. That is one of the findings in a study released Monday, conducted by the Ponemon Institute and sponsored by Thales E-Security ...

Google Dresses Up Android Wear

Google on Monday released an update to Android Wear -- just the second significant feature refresh for its wearable device software since its introduction more than a year ago ...

Mayer Wins Concessions in Rejiggered Microsoft-Yahoo Deal

Microsoft and Yahoo on Thursday announced they were altering a search partnership that has been in place since 2009 ...

SPOTLIGHT ON SECURITY

Opening Windows Source Code Could Improve Security

Microsoft Technical Fellow Mark Russinovich raised a few eyebrows at ChefCon earlier this month, when he aired the possibility of Windows becoming an open source program ...

Industry Groups Lead Net Neutrality Lawsuit Parade

Several wireless and cable industry groups on Tuesday filed lawsuits challenging the Federal Communications Commission's new open Internet rules ...

New Smart Drone Breaks $1K Barrier

A new aerial drone from 3D Robotics packs two computers and an array of powerful features for US$999 ...

Flir Debuts Triple-Threat Video Cam

Flir Systems, known primarily for its commercial sensor products, on Tuesday made a foray into the consumer market with a new video camera that can be used for home monitoring, sports, and even as a dash cam ...

Emojis Get Real in New iOS

Apple on Thursday released a new version of iOS that adds racial diversity to its emoji library ...

SPOTLIGHT ON SECURITY

Heartbleed Threat Won’t Fade Away

This week marks the first anniversary of the Heartbleed vulnerability that caused a panic across the Internet last year. While the flaw appears to have faded from the recollections of Net denizens, it still poses danger at many sites in cyberspace ...

IBM, Apple Deepen Their Mobile Enterprise Incursion

IBM and Apple last week released an octet of iOS apps for the enterprise aimed at improving productivity in the healthcare, airline and insurance industries, as well as on the factory floor ...

Microsoft Could Throw Windows Wide Open

Open sourcing the code for Microsoft Windows is "definitely possible," Microsoft engineer Mark Russinovich reportedly said last week during a panel discussion at ChefConf ...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels