Salesforce.com adding 'social intelligence' features to Chatter
Salesforce.com continues to build out its Chatter social networking and collaboration software, with upcoming "social intelligence" capabilities that will allow users to find information through new Topics and Expertise categories. Chatter is built into Salesforce.com's underlying Force.com technology platform, allowing users of its CRM (customer relationship management) and other software to use social collaboration tools within a business context.
Read More ...
The end of Moore's Law is on the horizon, says AMD Theoretical physicist Michio Kaku believes Moore's Law has about 10 years of life left before ever-shrinking transistor sizes smack up against limitations imposed by the laws of thermodynamics and quantum physics. That day of reckoning for the computing industry may still be a few years away, but signs of the coming Moorepocalypse are already here. Just ask chip maker AMD. The company's Chief Product Architect John Gustafson believes AMD's difficulties in transitioning from 28-nanometer chips to 20-nanometer silicon shows we've reached the beginning of the end. Read More ...
Mozilla and Samsung team up for Servo, a secure browser engine Mozilla and Samsung are tag-teaming on a new, highly secure Web browser engine dubbed Servo, built on Mozilla's new "safe systems" programming language called Rust. Read More ...
Employees still use online file sharing, even if companies prohibit its use More than 75 percent of corporations have policies that prohibit the use of consumer OFS (online file sharing) and collaboration tools, yet employee use of the services is still rampant, according to an Enterprise Strategy Group survey. "The thing is, IT had control of the data in the past. Now, it has only been three years since this [OFS] market has taken off and now data is everywhere," said Terri McClure, who spoke at SNW here Tuesday. Read More ...
Companies experience a malware event on their systems every three minutes, report says Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye. "This activity can include the receipt of a malicious email, a user clicking a link on an infected website, or an infected machine making a callback to a command and control server," the company said in its report. Read More ...
With Spock, application testing is only logical Credit: Reuters Read More ...
Windows RT tablet prices plummet, along wth its prospects Windows RT tablet prices are falling -- rapidly. Given Windows RT's adoption rate, that shouldn't surprise anyone. Read More ...
Prosecutors, others involved in Swartz case express safety, privacy concerns The U.S government and two other entities involved in investigations leading to the indictment of the late Internet activist Aaron Swartz have asked a federal court in Boston to redact the names of people involved in the case from documents being sought by Swartz's estate and by some lawmakers. Read More ...
Google simplifies integration of SMS and voice with App Engine Google is hoping to make it easier for developers to integrate SMS or voice communications in applications running on the company's App Engine platform. Working with Twilio, Google has created native Python and Java libraries for working with Twilio APIs. The integration allows developers to start building and adding voice and SMS features to their apps straight away, the company said in a blog post. Read More ...
Mozilla refines Firefox's private browsing, patches 13 browser bugs Mozilla on Tuesday shipped Firefox 20, adding more flexible private browsing and patching 13 vulnerabilities, five rated "critical" by the company's security team. Along with the privacy change, Mozilla also revamped Firefox's download manager and added a crash tool that warns when a plug-in has hung for at least 11 seconds. Users can then shut down the offending plug-in rather than rebooting the browser. Read More ...
ICANN announces emergency back-up registry operators in wake of security criticisms The Internet Corporation for Assigned Names and Numbers (ICANN) has selected three emergency back-end registry operators to guarantee domain names within a new generic top-level domain (gTLD) will resolve in the event of a failure at a new TLD operator, it said on Tuesday. Read More ...
Know the key legal and security risks in a cloud computing contract Enterprises that store data with cloud providers may no longer have physical control over it, but they're still on the hook legally for its protection and security. Knowing what goes into a SaaS contract -- and the risks associated with what's not included -- can mean the difference between a costly lawsuit or a successful partnership, according to technology attorney Milton Petersen. Read More ...
Available Tags:AMD , Mozilla , Samsung , Windows , tablet , Google , security ,
No comments:
Post a Comment