<b>Open Enterprise:</b> "Regular readers of this blog may have noticed that I write a lot about software patents. The reason is simple: they represent probably the greatest single threat to free software, far beyond that of any individual company."
Seeking secure storage? This portable hard drive combines hardware encryption with hardware protection -- a built-in numeric keypad and PIN that stop unauthorized data access dead.
<b>IT Wire:</b> "Announced earlier today, the 35th list of the top 500 supercomputers contains few surprises, just that Linux has almost total domination of the list."
The plethora of netbook choices may appear remarkably similar, yet the differences in hardware make all the difference for the busy professional. Here are some tips on selecting the best netbook for your needs.
An appellate court upheld a lower court's finding that eBay did not engage in trademark infringement by providing a marketplace for sellers to auction off counterfeit Tiffany Co. jewelry.
Utilisez-vous le Cloud pour vos développements ? Le(s)quel(s) et comment ?
Répondez à notre sondage en moins de deux minutesLe Cloud. Tout le monde en parle (y compris nous). Mais qui l'utilise vraiment ? Pour quels types de développements ? Avec quelles technologies et comment ?C'est pour répondre à ces questions, et au final pour mieux cerner vos usages des plateformes hébergées que nous avons décidé de vous poser quelques questions pour mieux comprendre votre utilisation du Cloud et mieux cerner...
Three expert entrepreneurs offer tips and tactics to build a multi-million dollar business, to improve your productivity and to make money from your social media network.
Three expert entrepreneurs offer tips and tactics to build a multi-million dollar business, to improve your productivity and to make money from your social media network.
<b>LinuxInsider:</b> "European privacy advocates have added their voices to complaints about Facebook's privacy changes, and they say certain ways Facebook treats data may even be illegal under European laws."
The security software vendor acquires a cloud-based storage company to provide online backup and data synchronization services for small businesses and individual consumers.
Microsoft Silverlight has progressed with big steps since the initial version only a few years ago. Today, Silverlight 4 is suitable for building even business applications. Read on to learn how you can use Silverlight 4 and Windows Communication Foundation (WCF) RIA Services to build compelling applications.
Preliminary survey by Citrix shows companies are ready to purchase the iPad for business, as are individuals for business purposes. What's the most popular iPad application for business?
Now that Ubuntu founder Mark Shuttleworth is devoting his full energies to desktop design, the changes are coming thick and fast. But are these new designs based on flawed assumptions? Is Ubuntu forking GNOME?
CrazyEgg offers a colorful twist on your small business Web site traffic. Plus, a site for downloading free books and a nifty stopwatch with loads of features.
CrazyEgg offers a colorful twist on your small business Web site traffic. Plus, a site for downloading free books and a nifty stopwatch with loads of features.
Windows 7 represents an advance in Microsoft security, while Snow Leopard enjoys Apple’s traditional security advantage. A security expert compares the operating systems' security on a feature by feature basis.
Windows 7 represents an advance in Microsoft security, while Snow Leopard enjoys Apple’s traditional security advantage. A security expert compares the operating systems' security on a feature by feature basis.