Search

Filter:

Search Results

News scan: Microsoft continues layoffs; Wearables market to continue growing; More

staffing shortage, survey says) Wearables market to reach $53 billion in five years Apple's move ...

News Scan: Men lose mobile phones more often than women; Red Hat buys FeedHenry for $81.5M;

on PayPal: Apple Pay to take a bite out of PayPal | eBay to spin off PayPal] ...

Apple's iPhone 6 finally goes on sale; From cell phone bans to BYOD;

Apple's iPhone 6 is finally here >> Apple's iPhone 6 And 6 Plus Go On Sale To Long Lines Of Fans (TechCrunch) From cell phone bans to BYOD >> From Cell Phone Bans to BYOD (T.H.E. Journal) Qualcomm releases AR SDK >> Qualcomm Releases AR SDK for Gear VR, Epson, BDG (Wireless Week) ...

Apple defiant about protecting iPhone data even in the face of government warrant

Apple cannot bypass your passcode and therefore cannot access this data. So it's not technically ...

Apple reportedly releasing iPad Air 2, new iPad mini at mid-October event

Apple is reportedly planning another event on Tuesday, October 21, according to various reports. The company had released new iPad tablets on October 22 last year, which does lend to the rumor of an iPad refresh in October. According to the technology blog The Daily Dot, Apple "is planning to hold its ...

Lexar unveils world's fastest SD cards based on the UHS-II bus

of $546.99 (256GB), $174.99 (128GB), $97.99 (64GB), $55.99 (32GB), and $31.99 (16GB). On its part, ...

Mobile drags down Sony; Not the iPhone 6;

2014 Apple Puts Focus on Security http://t.co/zOt7DfZnSr — Michael Keithley (@mkeithley) September 18, ...

News Scan: BBM's new mobile payment features; Swrve pockets $10M;

payments: Apple's iOS 8 and the enterprise | Apple's 'new' NFC-based mobile payment tech ...

Cisco aims to differentiate OpenStack with its Metacloud buy

As Perilli told the story of attending a press day event at the 2013 OpenStack Summit, when unnamed vendors ...

Oldest malicious macros still exploit flaws in our digital society

I don't do a story like this and essentially state how a malicious agent works, because I give people too ...