Vulnerabilities in the Cloud?

Researchers recently identified a security issue in Amazon's Elastic Computer Cloud (EC2) that allows a hacker to to locate and eavesdrop on targeted virtual machines  anywhere in the cloud. The report--with the catchy title "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Computer Clouds". According to [...]

By |2016-12-21T00:14:51-05:00November 2nd, 2009|Blog, Uncategorized|

Once Begun is ONLY Half Done

Buddha teaches us that there are only two mistakes that can be made along the road to truth: not starting and not going all the way.  In the brief history of Internet governance, few initiatives have been greeted with wider support than the recently signed Affirmation of Commitments between the [...]

By |2016-12-21T00:14:51-05:00October 28th, 2009|Blog, Uncategorized|

New Processors in Mobile Market Helps Handsets, Helps Software Developers

As featured on Slashdot, competition among processors that power mobile handsets is heating up. ARM--whose chips dominate the mobile phone market--announced its smallest, lowers power multicore chip yet. These chips are meant to compete against Intel's Atom processor (which powers many Netbooks) in the smartphone market. As users look to [...]

By |2014-04-14T15:03:22-04:00October 26th, 2009|Blog|

This Week In Antitrust

Today, we're kicking off a new feature on the blog, a weekly round up of the tech industry's various antitrust cases and "potential" antitrust concerns. While last week's antitrust news was dominated by competition concerns outside the technology industry (health insurers and the BCS), there were a few notable stories [...]

By |2016-12-21T00:14:51-05:00October 26th, 2009|Blog|
test backlinktes aja bos
Go to Top