Do Thumb Drives Make Your Business Vulnerable?
Karsten Nohl, and Jakob Lell, a pair of techs working out of Secure Research Labs, seem to have discovered a weakness before the hackers have. The good news is that […]
Karsten Nohl, and Jakob Lell, a pair of techs working out of Secure Research Labs, seem to have discovered a weakness before the hackers have. The good news is that […]
The Internet Mavens in Silicon Valley have decided that the time of credit cards has come to an end. They seem less sure about what exactly will replace them. At […]
Media monitoring is one of the components of competition monitoring. The basic idea is that you select various monitoring targets, then do a periodic sweep through various media channels to […]
Recently, Bluebox Security has discovered a serious security flaw in the Android OS that impacts all versions of the OS from 2.1 (Eclair) to 4.3 (Jellybean). In looking at the […]
Companies are relentlessly striving for new and better ways to gain insights into their customers. How customers and followers interact with images posted on social media is a fantastic way […]
A new and rather unusual video game has just been released for the PlayStation by Dutch design studio Digital Dreams. The basic idea is that video games are inherently data […]
When things are going well and the profits are pouring in, then perhaps a focus on cost savings doesn’t have to be at the top of your priority list. Most […]
IBM’s latest project is called SyNAPSE, and its purpose is to create a computer with a system architecture that closely resembles a human brain. This, it is believed will be […]
Just when you thought it was safe to go back into the IT jargon waters, here comes another new buzzword to boggle your mind. In this case, however, the term […]
A very smart man named Seth Godin once said that it takes three to five years to become an overnight success. There’s a lot of truth to that. In terms […]