Recent Posts

Trojan.Fakefrag and the UltraDefraggerFraud family

May 30, 2011 at 11:30 pm

A Trojan recently discovered in the wild is making changes to compromised computers, attempting to make users think the hard drive is failing and getting […]

Read more
Cisco: Big Things Are Happening…learn who is at the heart of the digital revolution 0 commentsEnterprise/Business

Cisco: Big Things Are Happening…learn who is at the heart of the digital revolution

May 23, 2011 at 5:11 am

By 2013 there will be 50 billion networked devices. Learn who sits at the center of this digital revolution in the latest ‘Did you Know’ […]

Read more
TAT: Horizon 2D-3D Map 0 commentsDesign

TAT: Horizon 2D-3D Map

May 23, 2011 at 5:02 am

This TAT concept seamlessly combines maps in 2D and 3D. While 2D maps are great for getting a simple overview of a place, 3D maps […]

Read more
Google I/O 2011: Enterprise Workflow with Apps Script 0 commentsEnterprise/Business

Google I/O 2011: Enterprise Workflow with Apps Script

May 14, 2011 at 10:05 pm

Developing comprehensive and user friendly workflow can be a time consuming and thankless task. We showcase several new features of Apps Script and demonstrate how […]

Read more
Google I/O 2011: YouTube’s iframe Player: The Future of Embedding 0 commentsWeb

Google I/O 2011: YouTube’s iframe Player: The Future of Embedding

May 14, 2011 at 10:01 pm

YouTube players allow for video playback in web applications. The latest YouTube’s embedded iframe player supports both Flash and HTML5 video and exposes a rich […]

Read more
Google I/O 2011: Using GWT and Eclipse to Build Great Mobile Web Apps 0 commentsWeb

Google I/O 2011: Using GWT and Eclipse to Build Great Mobile Web Apps

May 14, 2011 at 7:29 pm

Mobile web application development is HOT. But many developers are already familiar with web technologies such as HTML, CSS, JavaScript and GWT for building modern […]

Read more
Google I/O 2011: Bringing C and C++ Games to Android 0 commentsGadgets

Google I/O 2011: Bringing C and C++ Games to Android

May 14, 2011 at 7:28 pm

Want to make great Android games, but you’re not a Java programmer? This talk is for you. Android supports a toolchain for building applications in […]

Read more
Google I/O 2011: Cloud Robotics 0 commentsGoogle

Google I/O 2011: Cloud Robotics

May 14, 2011 at 7:13 pm

Learn how developers can accelerate the pace of robotics research and development and make high functioning robots affordable and universally accessible.

Read more
Google I/O 2011: GWT + HTML5: A web developers dream! 0 commentsWeb

Google I/O 2011: GWT + HTML5: A web developers dream!

May 14, 2011 at 7:04 pm

How can you take advantage of new HTML5 features in your GWT applications? In this session, we answer that question in the form of demos […]

Read more
Hyperic for Sysadmins & Production Ops 0 commentsEnterprise/Business

Hyperic for Sysadmins & Production Ops

May 14, 2011 at 5:36 am

A demonstration of Hyperic and how it enables sysadmins to manage large environments, both in terms of giving them visibility into app infrastructure performance, as […]

Read more
First Look at SolarWinds User Device Tracker 0 commentsEnterprise/Business

First Look at SolarWinds User Device Tracker

May 14, 2011 at 3:09 am

The SolarWinds Head Geek, Josh Stephens and Product Manager, Mav Turner introduce you to the all new SolarWinds User Device Tracker. Track any device by […]

Read more
Tech 10: Identity Protection Technology and Secure VPN 0 commentsSecurity

Tech 10: Identity Protection Technology and Secure VPN

May 14, 2011 at 3:06 am

Jake Gauthier, vPro Uber Geek, joins host Michele Gartner to talk about one of his favorite topics – Intel Identity Theft Protection. He provides a […]

Read more
Intel: Intel Cloud Computing 2015 Vision 0 commentsWeb

Intel: Intel Cloud Computing 2015 Vision

May 14, 2011 at 1:33 am

Current IT infrastructure must adapt to the increasing requirements and demand of users globally. Intel and its partners are working to develop cloud computing infrastructure […]

Read more
What Identity Issues Should The Enterprise Be Aware of With Public Cloud Computing? 0 commentsSecurity

What Identity Issues Should The Enterprise Be Aware of With Public Cloud Computing?

May 10, 2011 at 3:58 am

We’d like to call Eve Maler our first guest “vlogger.” We asked Eve to set up her video camera to answer a series of questions […]

Read more
File Transfer Is Not What It Used To Be 0 commentsSecurity

File Transfer Is Not What It Used To Be

May 10, 2011 at 3:56 am

Uploading files from the web is a standard practice but increasingly companies are asking for the same level of security that would be provided to […]

Read more