Borrowing a page from the recently revised Microsoft playbook, development tools maker Telerik has released as open source the bulk of its Kendo software library of components for building Web and mobile applications
Although Exadata is Oracle's most popular and mature "engineered system," some customers implementing the database machine are making mistakes that prevent them from getting the most performance out of the expensive product, according to a veteran of many Exadata projects.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
Five music labels have filed a lawsuit against streaming music service Pandora Music, saying the company is violating state law by refusing to pay labels and artists for its use of recordings made before 1972.
Cloud services can help CIOs free themselves from worrying about managing data centers, scaling capacity, configuring servers, applying security patches and other routine maintenance so they can focus on providing insight to improve the business.
Whether it's the first time you've picked up an iPad or the seventeenth time you've pulled out your iPhone today, there are probably still some iOS 7 features and functionality that you're not familiar with. Don't sweat it: We're here to help. We've collected some of our...
Heartbleed has dominated tech headlines for a week now. News outlets, citizen bloggers, and even late-night TV hosts have jumped on the story, each amping up the alarm a little more than the last one. But while it's true Heartbleed is a critical flaw with widespread implications, several...
Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network.
Oracle has issued a comprehensive list of its software that may or may not be affected by the OpenSSL (secure sockets layer) vulnerability known as Heartbleed, while warning that no fixes are yet available for some likely affected products.
On Wednesday, the Ponemon Institute released the results of a new study conducted for DB Networks. In it, 65 percent of the respondents said that they've experienced one or more SQL Injection attacks in the last 12 months. In addition, each incident took an average of 140 days to discover, and...
In an indication that CEO Marissa Mayer is not yet seeing dramatic results from her efforts to turn the company around, Yahoo's sales dipped slightly in its first quarter, amid some gains in its search advertising business.
After dragging its feet for months, Apple is finally making good progress on a court-ordered antitrust compliance program related to the U.S. Department of Justice's e-book price-fixing case against the company, an external monitor said.
Free Wi-Fi aggregator Fon is hoping to boost the popularity of its network with the Gramofon, a router that integrates music streaming. The first service to be added is Spotify, but more are on the way.
The cloud is more than just dirt-cheap data storage and lightning-fast apps. These six innovations show that it's possible to manage servers, develop applications, run virtual machines and even sequence the human genome using cloud technology.
The developers behind Jetpack, one of WordPress' most popular plugins, have patched a serious flaw introduced in 2012 that would enable an attacker bypass access controls and publish posts to any website hosted on the blogging platform.
2012 Consumer Electronics Show: From high-definition video calling via your HDTV to practically indestructible SD cards for your camera, here’s a look at 20 gadgets and services that will be making a splash at the Las Vegas Convention Center in January.
As Gartner warns IT leaders to be ready in case a second recession hits, CIO.com's Thomas Wailgum shares his thoughts on how CIOs can actually slash pesky budgets. Hint: Unpaid interns, meet Russian hackers!
Move over Nexus One: A slew of Android smartphones in all shapes and sizes invaded the show floor. Other phone trends we saw were affordable, yet stylish messaging devices for tweens and revamped versions of favorites from last year.
Laptops of all shapes and sizes launched at CES this year, but a few were a bit more special than most. Here are eight machines that shift forms, implement the newest technology, and redefine their categories altogether.
Buying a new BlackBerry smartphone? Looking to spruce up an old Pearl or Curve 83xx? You've come to the right place. Our list of the top six best BlackBerry accessories will have your device, old or new, outfitted and up to snuff in no time. Best of all, the half dozen of them can be had for $100...