Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
Most companies do not have a formal approach to create and manage this video. The lack of a formal approach, a video management strategy, results in inefficiency, confusion, increased costs, lost opportunities, and decreased agility over time says North Plains' George Grippo.
China's Baidu sues US domain registrar over attack
Leading Chinese search engine Baidu.com has filed a lawsuit that blames a US-based internet domain registrar for allegedly allowing a hacking attack that left the site disabled and defaced.
Regulations and compliance: The business justification for data security
New and stricter federal and state legislation is mandating the protection of consumer and patient personal information. Plus, business owners are being held accountable. What's a company to do?
Facebook is susceptible to certain types of attacks that could allow someone to hijack an account while a user is interacting with another website, a security researcher warned.
The shortage of IPv4 addresses has reached a critical stage - less than 10 percent are still available - according to the registries that allocate internet numbers around the world.
Google is investigating whether employees in its China office were involved in the attacks on its network that led to theft of intellectual property, according to sources.
Matt MacLaurin created Boku, an all new programming language that could be run on an Xbox using only the console's controller to craft basic logic. Now it hits the PC.
Apple adds Vodafone as a fourth iPhone option for UK cell phone users. The only differences between the four appear to be pre-installed apps and complicated pricing options.
Asus has prototype Android and Chrome OS smartbooks in its labs and is currently deciding whether to release an ARM-based device alongside its Intel-based Eee PC netbooks
Unpatched Adobe holes link Google and earlier attacks
A security expert says targeted attacks on Google and more than 30 other US companies late last year bear striking similarities to targeted attacks on 100 US companies last summer.