The Latest in IT Security

Posts Tagged ‘computing devices’

How much trust do you put in Apple’s stewardship of the App Store – the online marketplace where you can download apps for your iPhone or iPad? Chances are that you don’t think twice about installing software from the App Store – after all, all the software up there has been verified by “Apple”, right? […]

Read more ...

Have you ever forgotten the login password on your MacBook? Fortunately, there’s an option to receive a hint reminding you of what your password might have been. Which is terrific, unless – of course – someone else is able to work out your password from that hint. Someone like, for instance, the guy who has […]

Read more ...

Google’s hackerishly hirsute Open Source Programs Manager, Chris DiBona, stormed the IT headlines this week when he stuck his paddle into the computer security world and stirred. In a blog posting which was at least as far above the line in gung-hovity as it was below the line in orthography, DiBona openly referred to vendors […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments