Rackspace’s arrival in Australia last week – complete with a swipe at local player Macquarie Telecom – has brought a response back from MacTel.
The founder of British charity ChildLine is calling on the government to take a hardline approach against what some consider to be hardcore pornography online - by enforcing an opt-in system for adults to protect kids from being traumatised by the images.
Data is easy. It comes in tables that store facts and figures about particular items – say, people. The columns define the data to be stored about each item (such as FirstName, LastName) and there is one row for each person. Most tabular database engines are relational and we use SQL for querying. So this "Big Data" thang must simply be very, very big tables with lots and lots of rows.
CommentComment Imagination-fostering Lego is 80 years old this month and far from its roots as a creativity-inspiring construction toy for girls and boys.
The world’s largest mobile operator by subscribers, China Mobile, is finally jumping on the cloud computing bandwagon with its own iCloud rival, which will also be available to internet users outside the People’s Republic.
Chinese mobile comms giants Huawei and ZTE are in trouble with the US authorities again, this time as part of a wider patent investigation by the ITC which could result in some of their mobile device models being banned in the States.
VMworld 2012VMworld 2012 It is not as much fun to be in the server part of Advanced Micro Devices these days, with Intel surging in the server racket and expanding out to switching and storage with its Xeon processors and Intel more or less counting the substantial innovations that AMD's engineers crafted for the Opterons a decade ago. The good news if you like a good fight is that there is a whole new management and engineering team at AMD now, and they not only understand that AMD has to do some serious innovating, but they are itching for the fight.
VMworld 2012VMworld 2012 The US Air Force doesn't let a single operator of a missile site launch a nuke all by his or her lonesome, and HyTrust, a maker of policy management and access control software for VMware virtual infrastructure, thinks IT shops should adopt the secondary approval rule for a lot of things that go on inside of the ESXi hypervisor and its vCenter management console.
All of those apps you run on your smartphones and tablets and the surfing you do from PCs and other devices ultimately ends up whacking some data center network somewhere in the world. The appetite for bandwidth and low latency continues apace, and switch and adapter chip maker Broadcom aims to keep up with that demand with its new Strata XGS Trident II switch ASICs.
Dropbox has followed through on an earlier promise and is rolling out two-factor authentication for its Windows, Mac, and Linux users.
UpdatedUpdated Now that the jury in the landmark Apple-Samsung patent trial has returned a $1bn verdict in Apple's favor, the next step will be to decide just which of Samsung's mobile phones will be permitted to be sold in the US.
VMworld 2012VMworld 2012 Everything you and the world's greatest process wonks know about building and operating data centres is wrong if you're assembling a private cloud, says VMware, and only its new Cloud Ops offering - billed as a "New Operating Model for the Cloud Era" - can help you do it right.
On Tuesday NASA is pimping out its Curiosity rover to silly-named songster will.i.am so that he can use it to premiere his latest song Reach for the Stars.
VMworld 2012VMworld 2012 The most important new feature of the new ESXi 5.1 hypervisor and its related vSphere 5.1 tools that made their debut at the VMworld virtualization extravaganza today is not a feed or speed, but the fact that VMware has dropped the much-hated vRAM memory tax that came out last year with vSphere 5.0.
As part of its ongoing bid to convince Office customers to switch to a subscription-based pricing model, Microsoft has announced that Office 2013 subscribers will be able to access temporary copies of the desktop Office applications on any computer, delivered via internet streaming technology.
Australia’s Shadow Communications Minister Malcolm Turnbull recently declared the IT media includes a number of “zealots” who won’t, such is their/my fanaticism, report fairly on his alternative National Broadband Network (NBN) plans.
The next territory in the Great Patent Land-Grab is at the end of your arms: in a patent granted last year that’s just hit publication, the Chocolate Factory gets its hands on using gloves as a user interface.
VMworld 2012VMworld 2012 EMC has shown off an early version of the all-flash array it acquired when hoovering up XtremIO earlier this year.
VMworld 2012VMworld 2012 VMware wants to make it simpler for its customers to make the jump from virtualized servers running its ESXi hypervisor to full-on clouds complete with all of the automation, disaster recovery, and other control freakage.
A new browser-based exploit for a Java vulnerability that allows attackers to execute arbitrary code on client systems has been spotted in the wild – and because of Oracle's Java patch schedule, it may be some time before a fix becomes widely available.