Random Post

Thursday, November 13, 2014
no image
FCC Tom Wheeler has responded to the White House's proposal for Net neutrality rules by reasserting his agency's independence in a meeting with executives of Google, Yahoo and other Internet companies following President Obama's Monday call to action. The president urged the FCC to ensure Net neutrality by interpreting Title II of the Telecommunications Act to govern ISPs. While Wheeler's response is viewed in some quarters as a challenge to the president, the FCC has said that Wheeler is taking the president's comments under advisement.


8:21 AM

FCC Tom Wheeler has responded to the White House's proposal for Net neutrality rules by reasserting his agency's independence in a...

Read more »
no image

6:11 AM

The idea of a startup studio, a hybrid between a VC fund and a coworking space and an accelerator, is becoming more and more popular. Today,...

Read more »
Wednesday, November 12, 2014
no image
The amount of open source software used by the U.S. government might well be one of the biggest secrets in Washington. Not even purveyors of FOSS, as in free and open source software, know the extent of federal agency adoption of nonproprietary software. Some in the Beltway Loop contend that open source is very prevalent. Others suggest that open source is avoided because its code is exposed for anyone to see. One thing seems very sure, however. Most government agencies cling to well-known commercial software for desktop services.


6:22 PM

The amount of open source software used by the U.S. government might well be one of the biggest secrets in Washington. Not even purveyors ...

Read more »
no image
The European Space Agency's 1.4 billion-euros Rosetta mission on Wednesday achieved a first for humankind by successfully landing its Philae probe on comet 67P/Churyumov-Gerasimenko. Now, the lander's fate hangs in the balance following a tense descent and the apparent failure of several key anchoring systems. "We are extremely relieved to be safely on the surface of the comet, especially given the extra challenges that we faced with the health of the lander," said Stephan Ulamec, Philae Lander Manager, following news of the probe's safe arrival.


4:41 PM

The European Space Agency's 1.4 billion-euros Rosetta mission on Wednesday achieved a first for humankind by successfully landing its ...

Read more »
no image
Microsoft on Tuesday announced the Lumia 535 -- the first smartphone under its own brand since it completed its acquisition of Nokia in April. Microsoft is marketing the 535 as its "5x5x5" smartphone package. It has a 5-inch screen and 5-MP front- and rear-facing cameras. Microsoft will offer both single-SIM and double-SIM versions. Both will be 3G phones, preloaded with Windows Phone 8.1 and the Lumia Denim update. Denim, codenamed "Debian Red" during development, is the latest firmware for Lumia handsets.


11:30 AM

Microsoft on Tuesday announced the Lumia 535 -- the first smartphone under its own brand since it completed its acquisition of Nokia in Ap...

Read more »
no image
Hackers siphoned off data from United States Postal Service servers for more than eight months before being detected, the USPS said. Personal data -- including names, dates of birth, Social Security numbers, addresses, beginning and end dates of employment, and emergency contact information -- was stolen. "More than 800,000 employees and some retirees are impacted ... all that receive a Postal Service paycheck," said USPS spokesperson David Partenheimer. That includes the Postmaster General.


11:08 AM

Hackers siphoned off data from United States Postal Service servers for more than eight months before being detected, the USPS said. Perso...

Read more »
no image
Researchers at FireEye on Monday made public the existence of the Masque Attack, which threatens iOS and Mac OS X operating systems. Masque Attack exploits a flaw in Apple's OSes that allows the replacement of one app by another so long as both apps use the same bundle identifier. All apps, except those preinstalled on iOS, such as Mobile Safari, can be replaced. The fake apps can access the original app's local data, including log-in tokens. Among other things, they let attackers log into and loot victims' bank accounts.


7:57 AM

Researchers at FireEye on Monday made public the existence of the Masque Attack, which threatens iOS and Mac OS X operating systems. Masqu...

Read more »
 
Google Analytics Alternative