Technology News

Security risks mean IE6 must go

Determined to see the end of IE6, Microsoft is pouring resources into awareness campaigns as part of efforts to educate and encourage online citizens, particularly those in Asia, to ditch the 10-year-old Web browser or risk exposure to security attacks.

Redmond this week launched its latest and much-hyped Internet Explorer 9 (IE9), which plays a key role in Microsoft's plan to regain browser dominance.


Click the banner below to download IE9


Future of Screen Technology

Cisco Cius

Cisco CEO John Chambers demos the Cisco Cius, a First-of-its- kind HD Video-Capable Business Tablet, at Cisco Live in Las Vegas, NV on June 29, 2010. The New Android-based Computing Device Uses Cisco Collaboration Architecture and Virtual Desktop Integration to Deliver Mobile Computing, Collaboration and Communication Services.

Part 1

Part 2

Android Market Security

On Tuesday evening, the Android team was made aware of a number of malicious applications published to Android Market. Within minutes of becoming aware, we identified and removed the malicious applications. The applications took advantage of known vulnerabilities which don’t affect Android versions 2.2.2 or higher. For affected devices, we believe that the only information the attacker(s) were able to gather was device-specific (IMEI/IMSI, unique codes which are used to identify mobile devices, and the version of Android running on your device). But given the nature of the exploits, the attacker(s) could access other data, which is why we’ve taken a number of steps to protect those who downloaded a malicious application……More

Cisco Virtualization Experience


Learn how the Cisco Virtualization Experience Client endpoints allow you to move to desktop virtualization without compromising a rich collaborative user experience. Cisco Virtualization Experience Client endpoints help you to: choose from industry-leading desktop virtualization clients, deliver a better user experience with virtualized desktops, extend your investment in Power over Ethernet, and conserve desktop real estate.

Source : Cisco

MS Labs 2019 Vision Montage


Apple iPad 2: a first look


The second-generation iPad from Apple, iPad 2, is thinner, faster, lighter and whiter, but not a radical departure from the original. Pricing (only US pricing has been announced so far) is also holding steady, starting at $499 for a 16GB Wi-Fi-only model, rising to $829 for 64GB with 3G and Wi-Fi.

You can't blame Apple for going easy on new features. Apple's original recipe for the iPad single-handedly created and captured the demand for tablets last year. By any measure, it's not a product in need of fixing: it has the market share, it has the developers and it has the momentum.



Read more – Click for the source

The Possible Consequences Of Voip Misuse

As in everything else in life, the fast-evolving VoIP technology brings about both opportunities and challenges that users must face in equal measure. Most of the opportunities that can be gained from VoIP are well-discussed, as these relate mostly to improvements in business processes that lead to minimized telephone expenses, heightened productivity and ultimately, increased income.

On the other side of the coin are challenges and windows for abuse in VoIP systems that could get one in real trouble. These matters are less talked about, often because most people are not aware of these things. Those who are familiar also generally avoid discussing these, as they don't want to unduly raise alarms and make people wary of VoIP. Among these issues are:

Free VoIP
First, VoIP is usually not free. Free VoIP service is available if both the caller and receiver are calling via the Internet using SIP, XMPP or a third party application like Skype.

Related Coverage...

Read the Full Article Here