There has been an increase in AI-driven phishing attacks in Australia with research revealing that Australia is within the top 10 countries alongside US, UK, India and Germany targeted by phishing scams.
This year's OWASP Top 10 underwent some significant restructuring. A few vendors offered their thoughts.
What are the top 3 digital commerce technology that will do the most to transform e-commerce this year?
It's still 2012 and the 'new iPad' is yet to arrive at retail, but that doesn't stop us from issuing a list of Top 10 feature demands for the next 'new iPad', due to arrive in around twelve months from right about now.
The tablet computing device of the decade thus far is the iPad 2, even though most of it was developed and designed in the last decade, and while the Android Army dearly wishes it could annihilate the iPad 2, Apple is giving a lot of angst to the dastardly droids.
The iPad 2 is now officially here, and although there will likely be supply issues over the next couple of months as Apple tries to keep as many countries re-stocked as possible, here's some reasons why you might want an iPad 2.
We all know that the key metric for measuring Business Intelligence (BI) performance is the rate of end-user adoption. That is, the number of people within an organization who have access to and regularly use the reports generated by their reporting and analytics solution, to make sound business decisions.
Facebook lovers rejoice, Facebook haters get ready: Facebook and variations thereof were not only the most searched for terms in 2010, but Facebook was also the most visited site, although the asterisk comes if you merge Google and YouTube's visit results, as it too can then claim 'most visited' status.
With Google having launched its list of most searched-for terms in 2010 last week, I found myself wondering when Microsoft and Ninemsn would likewise list the top things that made it this year's Australian list of 'most binged things'. Here it is!
We recently came across this list of top 10 biggest issues with BI vendors and we could not agree more. This list is a set of grievances from independent software vendors, who wish to embed a BI solution into their application, that have had a poor experience with some of the other vendors in the industry.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]