UnityMobile wins 2012 Red Herring Top 100 Global

Unity Mobile is delighted to announce that it has been selected as a 2012 Red Herring Top 100 global award winner.   The award recognizes the achievements of leading private companies from North America, Europe and Asia, and celebrates startup innovations and technologies across their respective industries.   “Winning the Continue Reading

WordPress plugins – How to check for updates and install them

Plugins are tools to extend the functionality of WordPress. The core of WordPress is designed to be lean, to maximize flexibility and minimize code bloat. Plugins offer custom functions and features so that each user can tailor their site to their specific needs.   To check the version of WordPress Continue Reading

Why BYOD need not be chaos

More companies are expected to implement Bring Your Own Device (BYOD) policies in 2013 and beyond to manage the use of personal devices within enterprises.   While allowing employees to use personal devices for work makes them more productive, the practice often creates chaos for IT departments.   Apart from Continue Reading

McAfee: Watch out for mobile malware and attacks in 2013

The threat of mobile malware and large-scale attacks to take down infrastructure may become reality in 2013, according to a report released yesterday by McAfee.   The security company says it is likely that a new Trojan horse mobile worm will trick users into buying and installing malicious apps without Continue Reading

Businesses to spend more on enterprise software and big data

  A weakening U.S. dollar and growing demand for enterprise software will bolster IT spending this year.   Gartner noted on Thursday that global IT spending will grow 4.2 percent from last year to reach US$3.7 trillion in 2013. When measured in constant U.S. dollars, IT spending will grow by  Continue Reading

Microsoft confirms bug in older IE versions

  While you were partaking in the year-end festivities, cybercriminals had a field day exploiting a loophole in older versions of Internet Explorer.   Last Friday, the website of the U.S. Council of Foreign Relations was allegedly compromised by Chinese hackers who exploited the zero-day bug that was only discovered Continue Reading

Solid-state drives and mobility top data recovery challenges

  Solid-state drives (SSDs) may boost the performance of servers and PCs, but it can be difficult to recover lost data from those speedy drives when things turn awry.   According to Kroll Ontrack, a data recovery specialist, the complexity of how data is stored on SSDs makes recovering data Continue Reading

Akamai: online viewers start abandoning videos after 2 seconds of loading

Internet users are willing to wait just a mere two seconds for an online video to load before losing interest and moving on to something else, a recent study by Internet content delivery network Akamai has found.   For each second more that a video takes to load, the “abandonment Continue Reading

Commentary: Trust and data quality critical in self-service BI

Piecing data from multiple sources to glean useful business insights is often a frustrating affair. Even after the data sources have been identified, it would take days for an IT department to generate the reports you need.   In response, a flurry of software vendors, such as JackBe and QlikView, Continue Reading

>