Blogroll

9 rules to follow after you've suffered a data breach

Top Tech Stories - Fri, 06/13/2014 - 11:35

Upmarket Chinese restaurant chain PF Chang's became the latest prominent company to have its name linked with a data breach and stolen customer information.

Categories: IT General

Relive six decades of the computer desktop's changing face

Top Tech Stories - Fri, 06/13/2014 - 11:00
{"id":"156403","keywords":"Microsoft Windows","promo_thumbnail_path":"https:\/\/slidemedia.s3.amazonaws.com\/uploads\/roboto\/slideshow\/image\/8056\/slide_thumbnail_Slide_01.jpg","action":"Publish to Web","package_content":"{\"slide\":[{\"media_credit_text\":\"\",\"media_alt_text\":\"\",\"media_type\":\"Image\",\"body\":\"

Do you ever look at your computer's screen and think, “How on Earth did we get here?” Windows, Mac, GNOME, KDE, and Ubuntu's Unity are all born from a common history of desktop environment design stretching back to the 1960's.

Dek:  This trip down memory lane traces major milestones in the evolution of the desktop environment External Source:  networkworld.com Redirect Unpublished Slideshow to:  http://www.networkworld.com/slideshow/156246
Categories: IT General

Google open-sources PDF software library

Top Tech Stories - Thu, 06/12/2014 - 11:49

Google has started an open source project for a PDF software library, which developers will be able to incorporate into applications designed for a variety of platforms.

The project, called PDFium, will also be wrapped into Google's Chrome browser, replacing closed-source code, according to a post from Google's Chromium project evangelist, François Beaufort.

Categories: IT General

Google open-sources PDF software library

Top Tech Stories - Thu, 06/12/2014 - 11:49

Google has started an open source project for a PDF software library, which developers will be able to incorporate into applications designed for a variety of platforms.

The project, called PDFium, will also be wrapped into Google's Chrome browser, replacing closed-source code, according to a post from Google's Chromium project evangelist, François Beaufort.

Categories: IT General

The 12 biggest, baddest, boldest software backdoors of all time

Top Tech Stories - Thu, 06/12/2014 - 11:00
These 12 historically insidious backdoors will have you wondering what's in your software -- and who can control it Dek:  These 12 historically insidious backdoors will have you wondering what's in your software -- and who can control it External Source:  infoworld.com Redirect Unpublished Slideshow to:  http://www.infoworld.com/slideshow/155947
Categories: IT General

The 12 biggest, baddest, boldest software backdoors of all time

Top Tech Stories - Thu, 06/12/2014 - 11:00
These 12 historically insidious backdoors will have you wondering what's in your software -- and who can control it Dek:  These 12 historically insidious backdoors will have you wondering what's in your software -- and who can control it External Source:  infoworld.com Redirect Unpublished Slideshow to:  http://www.infoworld.com/slideshow/155947
Categories: IT General

Tech giants finally grow a spine and resist NSA spying

Top Tech Stories - Thu, 06/12/2014 - 11:00

Credit: Reuters/Jason Reed

Categories: IT General

4 reasons why Docker's libcontainer is a big deal

Top Tech Stories - Thu, 06/12/2014 - 11:00

Credit: iStockphoto

Of all the news that's come out this week around app containerization system Docker's 1.0 release, the details abut what's inside Docker may be most crucial.

Categories: IT General

Expert interview: How to scale Django

Top Tech Stories - Thu, 06/12/2014 - 11:00

This week, I'm stepping aside to let Jonathan Freeman, a developer at my company, take center stage. The topic is Django, the Python Web framework, and how to scale it.

Categories: IT General

Heartbleed still matters, and we're all partly to blame

Top Tech Stories - Thu, 06/12/2014 - 11:00

Two months on, the Heartbleed vulnerability is still worth talking about. One thing that needs to be discussed is that you and I are partly to blame for the problems Heartbleed caused. But we can also talk about some common-sense ways we can help protect ourselves in the future.

Categories: IT General

Joyent makes it easier to contribute code to Node.js

Top Tech Stories - Wed, 06/11/2014 - 17:31

Node.js, the JavaScript-based server that commands a strong developer audience, has been open source from the beginning. It's about to open up a little more.

Categories: IT General

Apple's Swift not so swift after all

Top Tech Stories - Wed, 06/11/2014 - 12:12

Apple cited speed as a key attribute of its Swift programming language when it was introduced last week.

Categories: IT General

Microsoft SQL 2014 drives deeper into the cloud

Top Tech Stories - Wed, 06/11/2014 - 11:00

Credit: iStockphoto

Categories: IT General

Google plunges in to Docker management

Top Tech Stories - Wed, 06/11/2014 - 11:00

Credit: iStockphoto

Categories: IT General

No boss? No problem! An ERP upgrade done right

Top Tech Stories - Wed, 06/11/2014 - 11:00

Credit: Otmar Winterleitner

Categories: IT General

Fast data: The next step after big data

Top Tech Stories - Wed, 06/11/2014 - 11:00

The way that big data gets big is through a constant stream of incoming data. In high-volume environments, that data arrives at incredible rates, yet still needs to be analyzed and stored.

John Hugg, software architect at VoltDB, proposes that instead of simply storing that data to be analyzed later, perhaps we've reached the point where it can be analyzed as it's ingested while still maintaining extremely high intake rates using tools such as Apache Kafka.

-- Paul Venezia

Categories: IT General

Black Tuesday toll: Microsoft drops Windows 8.1 support; XP hack still works

Top Tech Stories - Tue, 06/10/2014 - 20:06

The June 2014 Black Tuesday patches are out, and the Windows Update gods have spoken.

Categories: IT General
Syndicate content

eXTReMe Tracker