The U.S. Congress needs to consider alternatives to a Senate-passed bill that would require online retailers to collect sales tax based on the location of their customers, the chairman of the House of Representatives Judiciary Committee said Wednesday.
The White House urged tech workers, or "geeks," to sign up for health insurance under the Affordable Care Act, and said having the coverage will give them the "freedom and security" to start their own businesses.
By combining location data gathered using Bluetooth and Wi-Fi networks, German upstart Locoslab wants to improve the accuracy of indoor positioning, while at the same time implementing privacy features to assuage any fears users have.
Google yesterday said it would let developers of Chrome packaged apps issue free trials and offer in-app purchases, and allow creators of browser extensions to charge for their wares for the first time.
Google revealed yesterday that it will pay finance chief Patrick Pichette a $3 million annual bonus, and chief business officer Nikesh Arora a $3.5 million bonus, a small increase on the previous year.
Some software bugs are like the cicadia, emerging only under the 'right' conditions and wreaking havoc until they're stopped. Without the right tools, no amount of software testing can stop these bugs from causing a meltdown. Just ask Nasdaq.
The Dutch Military Intelligence and Security Service (MIVD) illegally shared data with foreign services and hacked Web forums without ministerial approval, according to a report made at the request of the Dutch House of Representatives.
Aruba Networks announced a package of software upgrades designed to better accommodate all-wireless workplaces, including sites where it's common to see employees using three different mobile devices with multiple applications.
Tests of carrier aggregation, a technology that will help increase the speeds of LTE networks, have been a positive surprise, but another technology called small cells needs to become more mature before it can help offload mobile networks, according to two executives at Vodafone Germany.
A U.S. district court judge on Tuesday froze the U.S. assets of Mark Karpeles, CEO of failed Bitcoin exchange Mt. Gox, and two associated companies, allowing lawyers to begin demanding documents from the three parties to investigate what they allege is a huge fraud.
Aviation experts have cited multiple possible reasons for the problems in the multi-country effort to locate the Malaysia Airlines jetliner that dropped off the grid over the South China Sea four days ago.
For this month's "Patch Tuesday" round of bug fixes, Microsoft has focused on correcting multiple vulnerabilities in Internet Explorer (IE), including one that is already being used in targeted attacks.
Given last year's revelations about the National Security Agency's (NSA) massive surveillance and data analytics conducted on Americans, along with continuing stories about local police scanning thousands of license plates per day, it might sound absurd to say that government lags behind the private sector in the use of Big Data analytics.
Apple dominates 64-bit mobile chip devices as rival smartphone makers wait for a 64-bit version of the Android OS, but that early lead could dissipate in the next four years, ABI Research said on Tuesday.
As the U.S. Secretary of Defense, Leon Panetta delivered strong warnings about the risks of cyberattacks on the country. His conviction that a possible 'cyber Pearl Harbor' may be looming has not tempered since leaving the post last year.
New York financial authorities said Tuesday that they would soon begin accepting applications for virtual currency exchanges including those dealing in bitcoins, in a sign of regulators' growing interest in the technology.
Attackers have abused the WordPress pingback feature, which allows sites to cross-reference blog posts, to launch a large-scale, distributed denial-of-service (DDoS) attack, according to researchers from Web security firm Sucuri.
Two companies using Facebook profiles to generate credit scores, their stands side by side at Cebit, are chasing different customers -- although they are competitors in the trade show's Code_n startup contest.
Juniper Networks' legal battle against Palo Alto Networks claiming infringement of application-firewall patents ended in a mistrial being declared in a Delaware court, but Juniper says it intends to haul Palo Alto back into court again.
People who plan to run Windows XP after Microsoft pulls the patch plug should dump Internet Explorer (IE) and replace it with a different browser, the U.S. Computer Emergency Readiness Team (US-CERT) said Monday.
Today's businesses generate more data than ever before. Luckily, storage technology is correspondingly cheaper and more plentiful than ever before. This means your small business has work to do if you want to build an effective storage and backup strategy.
A sneak peek at the annual Computing Research Association's (CRA) report on computer science enrollments at colleges shows that strong demand for technically-savvy workers is luring students in a big way.
While Japan on Tuesday marked the third anniversary of the 2011 earthquake and tsunami that left over 18,000 dead or missing, a huge crane has been quietly moving fuel rods out of a pool at the stricken Fukushima Daiichi nuclear power plant.
In 2008, the U.S. government changed the rules on student visas and allowed foreign STEM students to work in the U.S. for up to to 29 months without an H-1B visa. The program quickly grew in popularity.
A court in California has prohibited the destruction of phone records collected by the government until further orders, raising a potential conflict with an order last week by the secret Foreign Intelligence Surveillance Court in Washington, D.C.
Apple has released iOS 7.1, with an array of visual tweaks, some bug fixes, and an option that lets users turn off the so-called "parallax effect" that creates an illusion of changing perspective, and hence motion, in the radically redesigned user interface.
Each year, hundreds of vendors head to the RSA Conference in San Francisco, California, arguably the largest security gathering in the U.S. For many of those vendors, the show is a requirement, but there's a steep cost involved. For smaller companies, the show can create a sink or swim environment.
Building a Security Operations Center (SOC) from scratch or revamping an underperforming one is a daunting leadership challenge. Of all the tasks you have to think about, finding and hiring a set of SOC analysts with the right skill set has to be a top priority.
In 1993, a few years after immigrating to the U.S., Arkadiy Dobkin, an electrical engineer trained in Minsk, Belarus, started a company that aimed to tap the IT engineering talent developed in the former Soviet Union.
Fraunhofer Institute researchers are working to speed up the scanning of mobile app code for security flaws, aiming to offer developers in a few milliseconds the kind of analysis that once required an all-night scan of code.
Encryption technologies can be a powerful tool against government surveillance, but the most effective techniques are still largely out of reach to the average Internet user, Edward Snowden said Monday.
Oracle is planning to make significant investments in its ERP software for higher education institutions, with an eye on keeping the installed base happy and fending off challenges from the likes of Workday.
"There are four critical questions every enterprise and IT administrator should ask when considering file sharing services," says Adam Gordon, author of "Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press)." These include: Where will the service store and share files? Who will view the files? How will the service protect the files? And, what types of files will the service permit in the storage system? If a service provider doesn't respond satisfactorily, CISOs should consider their options.
Buying code modules from a curated marketplace can help usher applications into production on time and on budget. Because code marketplaces guarantee that developers will actively maintain modules, concerns about support are largely mitigated.
Serena Software founder Doug Troxel is teaming up with private equity firm HGGC to purchase the application development software vendor from Silver Lake Partners. Terms of the deal, which was announced Monday, were not disclosed.
Recently released security updates for the popular Joomla content management system (CMS) address a SQL injection vulnerability that poses a high risk and can be exploited to extract information from the databases of Joomla-based sites.
A decade ago, Microsoft kicked off SDL, or Security Development Lifecycle, a now-widely-adopted process designed to bake security into software, and began building what has become an unmatched reputation in how a vendor writes more secure code, keeps customers informed about security issues, and backs that up with regular patches.
The hacking of a U.S. military network that was made easier by a poorly written contract with Hewlett-Packard offers lessons on how negotiations between customer and service provider could lead to weakened security.
The Office of the National Coordinator for Health IT is taking incremental steps to make life easier for healthcare providers struggling to meet the criteria for the meaningful use of electronic health record technology. It's welcome relief for overburdened organizations -- but is it enough to meet their demands for improved interoperability?
With the introduction of Office 365 Home Premium last year, Microsoft radically changed the way it delivers Office to consumers. Instead of just offering an Office suite that includes a varied number of applications priced anywhere from $140-$400, the software maker wagered you'd pay $100 per year to get access to all of the Office apps and the right to install them on up to 5 PCs, plus extra Skype minutes and OneDrive storage.
The National Institute of Standards and Technology (NIST) warns that moving from IPv4 to IPv6 is a process fraught with peril, which may explain why government agencies are so far behind their own deadlines for implementation.
Get Daily News by Email
Sign up and receive the latest news, reviews and trends on your favorite technology topics.