News & Updates

  • chinese_hacker_microsoft-100585362-primary.idge[1]China turns up antitrust heat on Microsoft
    January 6, 2016
  • 4421756490_6df2e08527_o-100634877-primary.idge[1]The most innovative and damaging hacks of 2015
    January 2, 2016
  • binary_finary[1]Forget anonymity, we can remember you wholesale with machine intel, hackers warned
    January 1, 2016
  • satya-nadella-microsoft-39[1]Here’s everything we expect Microsoft to announce in 2016 Read more at...
    December 28, 2015
  • security_2016_1-100634429-primary.idge[1]5 information security trends that will dominate in 2016
    December 25, 2015
  • thinkstockphotos-1804077592[1]Why Organizations Might Need a Hybrid Cloud
    December 24, 2015
  • Sun_Oracle_logo[1]Oracle acquires StackEngine, plots new cloud campus in Austin
  • 7217.Windows-Azure-logo-v_6556EF52[1]Top Ten: FAQs About the Microsoft Azure IoT Suite and the Cortana Analytics Suite
    December 23, 2015
  • threestars[1]The Importance of Consistent VDI Performance
Web Design MymensinghPremium WordPress ThemesWeb Development

China turns up antitrust heat on Microsoft

January 6, 2016January 6, 2016
chinese_hacker_microsoft-100585362-primary.idge[1]In a cryptic statement, Chinese government regulators today demanded that Microsoft explain "major issues" in data authorities collected from the company last year during an antitrust investigation. It was the first time in more than a year that China's State Administration for Industry and Commerce (SAIC) hinted that its probe is continuing. "We're serious about complying with China's laws and committed to addressing the SAIC's questions and concerns," a Microsoft spokesperson said. Read more

The most innovative and damaging hacks of 2015

January 2, 2016January 2, 2016
4421756490_6df2e08527_o-100634877-primary.idge[1]Not a week went by in 2015 without a major data breach, significant attack campaign, or serious vulnerability report. Many of the incidents were the result of disabled security controls, implementation errors, or other basic security mistakes, highlighting how far organizations have to go in nailing down IT security basics. Read more..

Forget anonymity, we can remember you wholesale with machine intel, hackers warned

January 1, 2016January 1, 2016
binary_finary[1]32c3 Anonymous programmers, from malware writers to copyright infringers and those baiting governments with censorship-foiling software, may all be unveiled using stylistic programming traits which survive into the compiled binaries – regardless of common obfuscation methods. t was accompanied by the publication of an arxiv [PDF] titled When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries, written by researchers based at Princeton University in the US, one of whom is notably part of the Army Research Laboratory. Read more..

Here’s everything we expect Microsoft to announce in 2016 Read more at http://www.businessinsider.my/microsoft-announce-in-2016-2015-12/#r3OkUyvUdyauZX8z.99

December 28, 2015December 28, 2015
satya-nadella-microsoft-39[1]Microsoft has had a good 2015. The company introduced a new laptop, the Surface Book, launched a new version of Windows, updated a lot of its software for businesses, and updated its Surface Pro tablet and fitness Band.  But Microsoft CEO Satya Nadella is just getting started. He has big plans for Microsoft, including getting Windows 10 onto over one billion devices, expanding its current set of services, and introducing new hardware that will compete with Apple, Google, and Amazon. Read more at http://www.businessinsider.my/microsoft-announce-in-2016-2015-12/#r3OkUyvUdyauZX8z.99  

5 information security trends that will dominate in 2016

December 25, 2015December 25, 2015
security_2016_1-100634429-primary.idge[1]Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2016, information security professionals must understand these five trends.  Read more 

Why Organizations Might Need a Hybrid Cloud

December 24, 2015December 24, 2015
thinkstockphotos-1804077592[1]Hybrid clouds provide organizations with the option of hosting some workloads in the public cloud, and others in an on-premises private cloud. A hybrid cloud model provides multiple advantages, allowing an organization to choose the best location for a specific workload, rather than being in a position where workloads can only be hosted in one location or another. What determines the best location isn’t always a simple technical argument, and factors such as regulatory compliance can override arguments about efficiency and economy. Read more.

Oracle acquires StackEngine, plots new cloud campus in Austin

December 24, 2015
Sun_Oracle_logo[1]Oracle has announced a few moves in the last week that line up to bolster the tech giant's cloud agenda next year. A few days ago, it was quietly confirmed that Oracle acquiredStackEngine, a startup with a container operations platform for DevOps based in Austin, Texas. Read More.  

Top Ten: FAQs About the Microsoft Azure IoT Suite and the Cortana Analytics Suite

December 23, 2015December 23, 2015
7217.Windows-Azure-logo-v_6556EF52[1]The Internet of Things (IoT) is one of the latest and greatest buzzwords of the past year. But what exactly is the IoT and how can it help your business? Microsoft’s Azure IoT Suite and Cortana Analytics Suite are designed to enable you to take advantage of the IoT related to your business by capturing, collecting and analyzing the data from your company. The Azure IoT Suite helps you get started quickly by providing you with a set of preconfigured IoT solutions. Read More..

The Importance of Consistent VDI Performance

December 23, 2015
threestars[1]Orin Thomas shares a surprising tactic that could go a long way in boosting VDI user satisfaction. Read More..