Publication: Computer Technology Review

First reported 13 hours ago - Updated 1 hour ago - 1 reports

Red Hat Enterprise Linux 7 Release Candidate now becomes publicly available

Red HatRed Hat announced Wednesday that Red Hat Enterprise Linux 7 Release Candidate (RC) is now publicly available for testing.A pre-release build of Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7 RC offers a near-final look at Red Hat’s operating ... [Published Computer Technology Review - 13 hours ago]
First reported 22 hours ago - Updated 9 hours ago - 1 reports

Toshiba, SanDisk take 15nm NAND flash technology to the next level

ToshibaToshiba Corp. announced late Tuesday that it has developed 15-nanometer (nm) process technology, which will apply to 2-bit-per-cell 128-gigabit (16 gigabytes) NAND flash memories.Competitor SanDisk Corp. announced the availability of its 1Z-nanometer ... [Published Computer Technology Review - 22 hours ago]
First reported 21 hours ago - Updated 10 hours ago - 1 reports

FireEye finds that not all Android apps were vulnerable to the Heartbleed attack

FireEyeFireEye researchers found that roughly 150 million downloads of Android apps contain OpenSSL libraries vulnerable to Heartbleed. The security firm studied apps with vulnerable OpenSSL libraries and confirmed this attack.The OpenSSL Heartbleed vulnerability ... [Published Computer Technology Review - 21 hours ago]
First reported 18 hours ago - Updated 11 hours ago - 1 reports

New HDS virtualization technology offers business-defined tact for IT structure

Hitachi Data SystemsHitachi Data Systems Corp. announced Wednesday new technology to accelerate customer success with business-defined IT – a closer linking of a company's business and technology objectives that demands a more responsive IT foundatio ... [Published Computer Technology Review - 18 hours ago]
First reported 15 hours ago - Updated 15 hours ago - 1 reports

Kaspersky Lab financial report discovers increase in Bitcoin cybercrime

Kaspersky LabKaspersky Lab announced that according to its Financial Cyber Threats in 2013 study, financial malware targeting Bitcoin became increasingly popular in 2013 for both the public and cybercriminals. The number of attacks targeting the crypto-currency ... [Published Computer Technology Review - 15 hours ago]
First reported 16 hours ago - Updated 15 hours ago - 1 reports

Amazon Redshift offers greater concurrency, load from Amazon EMR, new SSL Cipher Suites

Amazon Web ServicesAmazon Web Services added three new features to its Amazon Redshift that enable increased concurrency, simpler data loading from Amazon Elastic MapReduce (Amazon EMR) and expanded SSL cipher suite support. These new features will be ... [Published Computer Technology Review - 16 hours ago]
First reported Apr 22 2014 - Updated 21 hours ago - 1 reports

Spectra Logic, CommVault merge to lower cost of data protection, management and access

Spectra LogicSpectra Logic announced Tuesday that it has joined forces with CommVault to lower the cost of data protection, management and access. Data management and movement by CommVault Simpana software, coupled with affordable disk and tape tiers ... [Published Computer Technology Review - Apr 22 2014]
First reported Apr 22 2014 - Updated 23 hours ago - 1 reports

Cisco’s Managed Threat Defense protects against known intrusions, guard against advanced persistent threats

CiscoCisco announced Tuesday Managed Threat Defense , a managed security solution that applies real-time, predictive analytics to detect attacks and protect against advanced malware across customers' extended networks.According to the Cisco Annual Security ... [Published Computer Technology Review - Apr 22 2014]
First reported Apr 22 2014 - Updated Apr 22 2014 - 1 reports

MariaDB Galera Cluster 10.0.10 now available in beta

MariaDBMariaDB announced Tuesday the second release in the MariaDB Galera Cluster 10.0 series in beta format. It combines MariaDB 10.0.10 and Galera Cluster with additional bug fixes, and is being released now to get it into the hands of any who might ... [Published Computer Technology Review - Apr 22 2014]
First reported Apr 21 2014 - Updated Apr 21 2014 - 1 reports

Mandiant finds that attackers exploit Heartbleed OpenSSL vulnerability to evade multi-factor authentication on VPNs

MandiantFollowing the public disclosure of the “Heartbleed” vulnerability, Mandiant incident responders identified successful attacks in the wild by targeted threat actors.The Heartbleed vulnerability publicly disclosed on Apr. 7 by security researchers ... [Published Computer Technology Review - Apr 21 2014]
First reported Apr 21 2014 - Updated Apr 21 2014 - 1 reports

IBM’s BlueMix PaaS solution caters to application development in the cloud

IBMIBM released Monday details about Codename: BlueMix , its PaaS offering based on open standards and cloud to build, deploy, manage and run omni-channel applications like web and mobile, big data and other smart services. Platform as a service (PaaS) ... [Published Computer Technology Review - Apr 21 2014]
First reported Apr 21 2014 - Updated Apr 21 2014 - 1 reports

MongoDB provides users with backup for sharded clusters

MongoDBA MongoDB backup strategy is necessary to protect mission critical data. Backing up a distributed database system, such as a MongoDB sharded cluster, presents an additional level of complexity because each shard runs somewhat independently, the ... [Published Computer Technology Review - Apr 21 2014]
Entities: MongoDB Inc, Database, NoSQL

Quotes

...Applications in the second category are designed to install software for bitcoin generation ( "mining”) on an infected computer. In absolute terms the bitcoin wallet thieves performed twice as many attacks in 2013; however, the tools for "mining" developed more rapidly."
...pace of business they are aligning the IT and business functions more closely than ever," said Brian Householder, COO, Hitachi Data Systems. "In order to execute in this business defined world, IT teams are looking to new infrastructure strategies to deploy more continuous, adaptable and scalable infrastructure. Businesses need solutions that don't require constant and disruptive changes to the technology they support. And that is what we are delivering today."
...Consequently, security has become our customers' number one concern," said Bryan Palma, SVP Cisco Security Solutions. "Managed Threat Defense lessens the worry associated with protecting against a breach and allows Cisco and its partners to add value where customers need it most."
"I'm extremely pleased to see us reach this major milestone in less than two years," said Andrea Pescetti, Vice President of Apache OpenOffice. "This is a testament to our community volunteers: the hundreds of talented individuals who make Apache OpenOffice what it is, who write the code, test for bugs, translate the user interface, write documentation, answer user questions and manage our servers. We remain committed to offering the successful combination of reliability and innovation that so many users appreciate."

More Content

All (106) | News (106) | Reports (0) | Blogs (0) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Red Hat Enterprise Linux 7 Release Candidate no... [Published Computer Technology Review - 13 hours ago]
Kaspersky Lab financial report discovers increa... [Published Computer Technology Review - 15 hours ago]
Amazon Redshift offers greater concurrency, loa... [Published Computer Technology Review - 16 hours ago]
New HDS virtualization technology offers busine... [Published Computer Technology Review - 18 hours ago]
FireEye finds that not all Android apps were vu... [Published Computer Technology Review - 21 hours ago]
Toshiba, SanDisk take 15nm NAND flash technolog... [Published Computer Technology Review - 22 hours ago]
Cisco’s Managed Threat Defense protects against... [Published Computer Technology Review - Apr 22 2014]
Spectra Logic, CommVault merge to lower cost of... [Published Computer Technology Review - Apr 22 2014]
MariaDB Galera Cluster 10.0.10 now available in... [Published Computer Technology Review - Apr 22 2014]
MongoDB provides users with backup for sharded ... [Published Computer Technology Review - Apr 21 2014]
IBM’s BlueMix PaaS solution caters to applicati... [Published Computer Technology Review - Apr 21 2014]
Mandiant finds that attackers exploit Heartblee... [Published Computer Technology Review - Apr 21 2014]
Apache OpenOffice has been downloaded 100 milli... [Published Computer Technology Review - Apr 18 2014]
Infortrend EonNAS 3000 Series boosts management... [Published Computer Technology Review - Apr 18 2014]
Rackspace bakes Enterprise Chef into DevOps Ser... [Published Computer Technology Review - Apr 18 2014]
US GAO finds that the SEC needs to improve cont... [Published Computer Technology Review - Apr 18 2014]
Future of Software Quality in an "Internet of T... [Published Computer Technology Review - Apr 17 2014]
Storage vendors meet certification standards on... [Published Computer Technology Review - Apr 17 2014]
Riverbed debuts SteelFusion 3.0, its branch con... [Published Computer Technology Review - Apr 17 2014]
McAfee expands local threat intelligence, stren... [Published Computer Technology Review - Apr 17 2014]
Kaspersky Security for Virtualization | Light A... [Published Computer Technology Review - Apr 17 2014]
Red Hat joins with SAP to offer data management... [Published Computer Technology Review - Apr 17 2014]
Google enables BigQuery and Datastore Connector... [Published Computer Technology Review - Apr 17 2014]
Treading Carefully: Exploring the Dangers That ... [Published Computer Technology Review - Apr 17 2014]
Oracle Virtual Compute Appliance X4-2 expands c... [Published Computer Technology Review - Apr 16 2014]
Red Hat Enterprise Linux 7 Release Candidate no... [Published Computer Technology Review - Apr 16 2014]
Canonical’s Ubuntu 14.04 LTS aims to become the... [Published Computer Technology Review - Apr 16 2014]
Microsoft unveils preview of its Azure cloud se... [Published Computer Technology Review - Apr 16 2014]
Google advises Compute Engine users to create n... [Published Computer Technology Review - Apr 15 2014]
IBM extends disaster recovery, security service... [Published Computer Technology Review - Apr 14 2014]
1 2 3 4
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.