Facebook, Google and Apple: partners and rivals, too
In war, the saying goes, the enemy of your enemy is your friend. But in the tech industry, sometimes your enemy is also an important business partner.
In war, the saying goes, the enemy of your enemy is your friend. But in the tech industry, sometimes your enemy is also an important business partner.
Business
Apr 8, 2013
0
0
The biggest vulnerability to Macintosh computers is the belief among their devoted users that Apple's superior operating system makes them immune to malware, experts say.
Security
Mar 15, 2013
0
0
Longtime users of Hotmail, MSN and other Microsoft email services will start noticing a big change: When they sign in to check messages, they'll be sent to a new service called Outlook.com.
Software
Feb 20, 2013
1
0
Some Mac users were taken by surprise Thursday as their computers stopped running programs written using the Java programming language after Apple blocked Java due to security problems.
Software
Jan 31, 2013
5
0
Former Nokia CEO Olli-Pekka Kallasvuo has joined Swedish TV software company Zenterio as chairman of the board.
Business
Jan 17, 2013
0
0
Apple has ousted the executive who oversaw the mobile maps program which was a spectacular flop, a report said Tuesday.
Business
Nov 27, 2012
0
0
Lauded by many critics, but struggling to catch on with consumers, Microsoft's Windows Phone smartphone software has gotten an overhaul.
Software
Nov 9, 2012
0
0
The release of Microsoft's Windows 8 operating system is a week away, and consumers are in for a shock. Windows, used in one form or another for a generation, is getting a completely different look that will force users to ...
Software
Oct 19, 2012
64
0
(Phys.org)—Microsoft's rocky reputation with the open source community was not exactly obliterated with hardware news surrounding the upcoming launch of the operating system, Windows 8. Systems will come with Secure Boot ...
(Phys.org)—Researchers from the UK and Germany have found that 3G telephony systems pose a security weakness that results in threats to user privacy. The weakness makes it possible for stalkers to trace and identify subscribers. ...