Businesses move quickly, and those that make missteps along the way or fail to adapt to the times rarely go unscathed. Consider the fate of the original 12 companies listed in the Dow. While General Electric is still an independent company, most of the others have been acquired by larger companies or have vanished altogether.
Google, Microsoft and Yahoo have been confirmed as the secret backers behind the European Privacy Association (EPA) which was accused of a lack of transparency by an independent watchdog on Thursday.
Devices built around Apple's iOS operating system have been approved by the U.S. Department of Defense for use on its networks, as the department moves to support multivendor mobile devices and operating systems.
With Bitcoin all the rage and startups popping up left and right, it's hard to know who's an expert in the virtual currency and who just has an opinion. Most people would put Jeff Garzik in the former camp.
The battle to find a balance between privacy concerns and the beneficial use of drones for commercial and law enforcement purposes is in sharp focus in a bill that's winding its way through the Texas legislature.
T-Mobile USA has dropped a pending challenge to the U.S. Federal Communications Commission's net neutrality rules.
Operators of two alleged tech support scams that charged consumers hundreds of dollars to supposedly fix their computers have settled charges from the U.S. Federal Trade Commission.
Mobile vendors are pushing technologies that split a smartphone into two separate platforms for business and personal data. Problem solved, right? Not so fast. It's still easy for employees to circumvent the two worlds.
Privacy laws protecting bank account holders are more important than providing information to aid in copyright enforcement, according to a Dutch court ruling this week.
The U.S. Congress should consider a "safe harbor" from legal action for consumers using works protected by copyright as it launches a long-term effort to revamp copyright law, some advocates said Thursday.
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
Sign up now »
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTSenior Python Web Applications DeveloperNSW
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTWeb Developer- Drupal and PHP. Exciting new position- #2 in Dev team.$100k+SuperNSW
- FTR&D EngineerSA
- FTSenior Python DeveloperNSW
- FTLead Software EngineerSA
- FTQuality ManagerSA
It’s time for midsize companies to start thinking differently about infrastructure. This white paper provides a brief overview of cloud computing, explains how midsize companies can benefit, and describes the ...
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
"Too little too late. Spice normally has better standards than this. I ..."
Spiceworks' free management software gets integrated MDM
- Chinese hackers resume attacks on U.S. targets
- Govt asks industry for help to stem security breaches
- Peculiar malware trail raises questions about security firm in India
- Attack on Telenor was part of large cyberespionage operation with Indian origins, report says
- Smartphones take center stage in two-factor authentication schemes