“Cloud-security” — Protecting Web Servers
If cloud computing is vulnerable (as I previously blogged) then there may be a product to the rescue. Last week TrendMicro introduced an update to its Deep Security product that [...]
Vulnerabilities in the Cloud?
Researchers recently identified a security issue in Amazon's Elastic Computer Cloud (EC2) that allows a hacker to to locate and eavesdrop on targeted virtual machines anywhere in the cloud. The [...]
Once Begun is ONLY Half Done
Buddha teaches us that there are only two mistakes that can be made along the road to truth: not starting and not going all the way. In the brief history [...]
New Processors in Mobile Market Helps Handsets, Helps Software Developers
As featured on Slashdot, competition among processors that power mobile handsets is heating up. ARM--whose chips dominate the mobile phone market--announced its smallest, lowers power multicore chip yet. These chips [...]
This Week In Antitrust
Today, we're kicking off a new feature on the blog, a weekly round up of the tech industry's various antitrust cases and "potential" antitrust concerns. While last week's antitrust news [...]
“Hey, Pot… It’s the Kettle.”
This news story from last week just about speaks for itself, and little commentary is needed. (And no, it's not a leftover from April 1.) It feels like something that [...]