Most Popular

Today's most popular content

News

SAP’s chief technologist asks government for clarity over data ownership

SAP’s chief technologist asks government for clarity over data ownership

SAP’s chief technologist makes the case for regulation over IoT - without stifling innovation read more »

In-Depth

The NSA is inside hard drive firmware - now what?

It’s been almost five years since the discovery of Stuxnet disabused the world of its naivety about nation state malware but since then more attention has been paid to Edward Snowden’s NSA hacking... read more »

Most Popular News

Healthcare and banks fall short on spam and phishing protection

Despite being relentlessly targeted by phishing and spam, the banking and healthcare sectors are still the least likely to use email security technologies to protect their customers, according to Agari’s Email TrustIndex for 2014. read more »

Russia said to open antitrust probe into Google

The investigation follows a complaint from Russian search engine Yandex read more »

Yahoo courts developers at its first mobile conference

Attendees at Yahoo's mobile developer conference had good things to say about its new tools read more »

Fashion retailer Fat Face improves customers’ digital experience with responsive website

Netsuite platform is part of the plans to give customers a seamless experience across all channels read more »

Welsh councils, police and NHS share data to identify vulnerable people

Agencies may make data matching and analysis scheme permanent after a successful trial read more »

more news ..
Most Popular White Papers

Top five data issues for 2015

Who is responsible for information in the new data world? read more »

Compute Transitions Drive the Need for the New IP Network

The Network Needs to Evolve to Support the Cloud Computing Era read more »

BYOD voice made easy, only with smartnumbers mobile

You own the number, they own the phone. read more »

The Rising Value– and Falling Cost– of App and Desktop Virtualisation

When vendors compete, desktop virtualization customers win. read more »

more white papers ..
Advertisement
Most Popular In Depth

The $1 billion ‘Carbanak’ bank heist - how it was done

At a time when physical money makes up a shrinking 8 percent of the currency in circulation, the ATM has become a reminder that people still love taking paper money out of holes in the wall. According to a Kaspersky Lab investigation, leaked to the New York Times at the weekend, we have been reminded that some of the technology’s biggest fans turn out to be criminals. read more »

Big data digest: The backlash begins

Critics diagnose the limits of big data, while analysts continue to see a bright future read more »

How Yahoo shaves millions off hardware costs with Hadoop

Internet giant upping its big data strategy along with its advertising revenue to rival Facebook and Google read more »

What price Agile? How to establish the right pricing model

Intelligent use of commercial project pricing models can help build trust and encourage use of Agile, says tech lawyer read more »

Computers will struggle to support genetic research for public health services

The lack of programmers who can ensure genome sequencing HPCs can scale will hinder treatment of the masses read more »

more in depth ..
Most Popular Slideshows

Universal Credit: top 10 milestones over the last year

Universal Credit: top 10 milestones over the last year

As the benefit reform scheme starts to expand nationally, we review progress so far read more »


The Internet of (your) Things: 7 smart products to connect your home

The Internet of (your) Things: 7 smart products to connect your home

Dreaming of a smart home? UK retailers are stocking simple IoT products to make it a reality read more »


Laptops, tablets and smartwatches: The evolution of mobile computing

Laptops, tablets and smartwatches: The evolution of mobile computing

Here are some of the most important portables we've toted around over the past 30 years read more »


Top 10 software failures of 2014

Top 10 software failures of 2014

Last year saw Amazon selling goods for 1p, UK airspace closed and iOS 8 phones unable to make calls read more »


2-in-1s: Top 5 laptop hybrids fighting their way into the enterprise

2-in-1s: Top 5 laptop hybrids fighting their way into the enterprise

After three years on the market, devices that can switch between laptop and tablet mode are gaining ground with consumers read more »


more slideshows ..
Advertisement
Blogs

EU Trade Secrets Directive Threatens Scientific Open Data

Clinical trials data at risk, as well as whistleblowersread more »

MWC prep guide: IoT for matrix commerce

Everyone will talk about connected homes, connected cars and the supply chain, but which platforms will win out?read more »

MWC15 prep guide: Disruptive technology for the enterprise

Mobile workplace. Embrace mobile as a way of working, not just as a deviceread more »

Reforming banking's culture of security secrecy

Recent bank malware attacks are telling us that security through obscurity is no longer enoughread more »

CC-BY: What Open Access Can Learn From Open Source

If you are worried about commercial exploitation, you're doing it wrongread more »

Here Comes the ACTA Attack - Again

Don't think they'll ever give upread more »

more blogs ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message