Related Content
The Downside of Green Power: Eagle Deaths The growth of wind farm deployments in the United States has been second only to gas-powered electrical plants in the past six years. Using alternative energy sources is a popular concept, but the growing use of wind farms has a downside—the killing of eagles and other wildlife. |
||
Target Investigating Security Breach of 40 Million Card Accounts Target is investigating a security breach where credit card and debit card information was stolen from millions of customers starting on Black Friday. The information was apparently stolen when customers swiped their cards at machines during checkout in stores. 40 million cards were compromised. |
||
US Cities as Niche Technology and Domain Epicenters We are not new to studies that tout top ten lists—such as the top ten technology cities in the US. While these mostly focus on technology collectively, niche technologies and domains are also being tied to cities. Rajini Padmanaban takes a look at US cities as niche technology and domain epicenters. |
||
The Most Memorable Security Breaches of 2013 This year may go down as the year of Internet security breaches. After all, it was only this year that people began to look over their shoulders at the NSA. However, the NSA wasn't responsible for all of this year’s most memorable security breaches. Read on for a 2013 roundup. |
||
NSA Uses Special Google Cookies to Aid in Surveillance In another news item released this week from the seemingly never-ending treasure trove that is the leaked Edward Snowden documents, details emerge of how the National Security Agency (NSA) is taking advantage of Google's cookies and other location data to help its surveillance operations. |
||
WorkSpaces—Amazon's Entry into Desktop as a Service Amazon continues to make ripples in the cloud computing technology market with the recent beta launch of Amazon WorkSpaces, a cloud-based desktop as a service (DaaS) solution. Anuj Magazine looks at what Amazon's somewhat late entry into the DaaS space says about its product strategy. |
||
New Malware Prototype Doesn't Need Internet Access to Run Amok Researchers in Germany have discovered a new way to transmit information between computers infected with a proof-of-concept malware prototype that does not need to be connected to the Internet to run amok. All it needs is access to a computer's microphone and speakers. |
||
Why Is OpenStack Neutron Struggling? After attending the 2013 OpenStack Summit, Beth Cohen highlights the latest information about OpenStack Neutron, the networking component, and why despite so many successes, the project is experiencing some pain points and struggling to find its connections. |