Hopes are evaporating that leading technology companies will offer a safe harbor this year from the economic storms swirling across Europe, Asia and the United States.
Investors should brace for some of the biggest names in US software and hardware -- from Microsoft and IBM to Intel -- to disappoint when Big Tech begins reporting quarterly earnings next week, analysts said.
The trio's shares are all in the red for July, in the wake of earnings warnings over the past week from smaller peers, including Advanced Micro Devices, Applied Materials and Informatica.
Lets discuss about live booting/ Live CD, Live cd is a Cd/ Dvd or any other portable media containing bootable Operating system. These media have the unique ability to run operating system without altering the files and operating system installed on the hard disk of the pc.
Now a days where Most of the organizations are working a lot to provide utmost security to their clients & customers, Hackers know how to bypass that security and hack the information. Recently over 450,000 email addresses and plain-text passwords are Hacked and circulated on the internet, in a document marked "Owned and Exposed".
The affected accounts belongs to a voice-over-Internet-protocol, or VOIP, service called Yahoo Voices, which runs on Yahoo’s instant messenger.
Social Networking is 'the buzzword' nowdays. People are more connected one another through Social Networking sites rather personally. A facebook update, a tweet informs a friend in India about his friend in US. Connecting with old and new friends through social media is the latest trend now. Latest statistics shows that there are more than 50 million Facebook users and !3 million Twiiter users only in India. While US tops the chart of total 900 million facebook users all over the globe.
Yesterday India, along with the rest of the world, saw the launch of IPv6 — the new internet protocol which aims at replacing current IPv4 in its way. According to the Department of Telecom, 27 Indian websites have already stepped on to the IPv6 platform. The reason IPv6 is being adopted is because of the problem of IP address shortage. There is a limitation on the number of IPs that can be supported by the existing IPv4 standard and going by the increasing number of devices, the web is going to run out of IP addresses this year. IPv6 is here to provide a solution to this problem.
Expressing grave concern about the growing threat of cyber terrorism in his opening statement at the meeting of Chief Ministers on National Counter Terrorism Centre (NCTC) held on May 5, 2012, Union Home Minister P. Chidambaram stated:
Google, the leading search engine giant acquired Quickoffice, a company best known for its mobile productivity suite for Android and iOS. Google plans to bring Quickoffice’s “powerful technology” to its own Apps product suite. Quickoffice allows its users to create and edit Microsoft Word, Excel and PowerPoint documents on their mobile devices. The company says its software is currently installed on over 300 million devices in more than 180 countries.
The financial details of the acquisition were not disclosed by either Google or Quickoffice.
Already struggling social networking site Facebook India and search engine Google India with Indian lawsuit to check and remove objectionable material from their web pages, got another notice from Delhi High Court. Based on a public interest litigation filed by K.N.Govindacharya, the Delhi High Court issued notice to the central government, social networking site Facebook India and Google India. Govindacharya, a right-wing Hindu activist in his PIL sought the recovery of taxes, which he alleges haven't come through as a result of the Indian operations of both Facebook and Google.
Expressing grave concern about the growing threat of cyber terrorism in his opening statement at the meeting of Chief Ministers on National Counter Terrorism Centre (NCTC) held on May 5, 2012, Union Home Minister P. Chidambaram stated:
Anup Girdhar, CEO of Sedulity Groups, says, "Getting networks, Web applications, Servers etc. tested by Cyber Security Professional is the only best utilitarian way for companies to establish the level of security of their networks & systems. With the ever-increasing risk of external attacks to websites, IT outsourcing and the adoption of new technologies including virtualization and cloud computing, organizations have to firstly, identify Cyber Threats and secondly, put control measures in place to defend themselves from all these Cyber Attacks."