2015년 3월 12일 목요일

First look: Google's new Chromebook Pixel

Technology: Google
March 12, 2015

First look: Google's new Chromebook Pixel

The "new" Pixel improves on the older model in a few key ways. There's still no way you'll mistake the Pixel for a Windows PC, but there's at least there's lots more to do with the Pixel this time around.
READ MORE
 

Issue highlights

White Paper: Proofpoint, Inc.

Analysis of Cybercrime Infrastructure

Proofpoint security researchers have published an analysis that provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled a cybercrime operation to target online banking credentials for banks in the United States and Europe, infecting over 500,000 PCs. VIEW NOW>>

Google Cloud Storage Nearline wants to be your cloud data vault

A new service from Google aims to provide Google Cloud Platform users with a way to archive data at low cost -- optionally via common backup products -- and retrieve that data in seconds. READ MORE

Dropbox’s Android SDK has a security hole

Security researchers at IBM have found a vulnerability in Dropbox's Android SDK, versions 1.5.4 through 1.6.1, which allows attackers to connect applications on mobile devices to the Dropbox accounts they control. READ MORE
Resource compliments of: DEMO Traction

See killer tech from 40 startups

One place. One day. Your best chance to see the best tech from a handpicked group of startup innovators. Attend DEMO Traction 2015, April 22 in SF to evaluate products in cloud, mobile, mart data and robotics. Tips on how to use new tech for competitive advantage. Live demos. Deep dives and more.LIMITED-TIME SAVINGS. REGISTER NOW.

10 cool tablets that are coming soon

Even though the BBC argues that the age of the tablet has essentially ended, manufacturers exhibiting at the Mobile World Congress in Barcelona this year have only begun to fight. Here's a look through some of the coolest tablets on display.READ MORE

Android tune-up: How to boost performance while you wait for Lollipop

We put several of the most popular third-party battery and performance management apps to the test to see whether they’re worth a download as you wait for Lollipop to land and to find out how they stack up against Android 5.0’s improvements. READ MORE
White Paper: Proofpoint, Inc.

How Attacks Exploit People as the Weakest Link in Security

Most advanced attacks rely as much on exploiting human flaws as they do system flaws. This paper uses original field research to provide insight on who’s clicking, what they’re clicking on, and when, where, and why the weakest link in security is all of us. LEARN MORE.

댓글 없음:

댓글 쓰기