Tip us off!
Can't find what you want or have a tip? Tell us about it and we will endeavour to cover this topic. Drop us a line
A lot of traction has been made in cities around the launch of new, cheap tablets, software applications for school curriculum, and pilots in schools with tablets. But it's the children in villages who really need tablets.
Country's technology imports far surpassed its technology exports by more than US$10 billion in 2011, and the government hopes to narrow the gap by boosting its exports.
The enthusiast component supplier's Atlas 480GB model is a record for the mSATA form factor, and it comes in at a $500 recommended retail price.
Delight your loved ones with these game inspired gifts.
A recent KPMG study lists some best practices adopted by telecom companies worldwide to mitigate sophisticated technology-aided frauds.
Evernote is hiring a company in India to help with support from January next year, and is in discussions with phonemakers and carriers to integrate the app with devices.
Have Singapore businesses really been using big data technology for the past 10 years?
What happens when PR companies develop the ability to drive traffic to news stories about their clients?
Having a BYOD program is good and all, but many companies fail to manage what apps employees are downloading on their mobile devices, according to Digital Sydney director Karen Scott Davie.
Individuals and micro businesses hoping to open a small Google Apps account for free will find that, from today, they will have to pay.
Telstra will need to continue marketing aggressively in regional Australia, using Foxtel and its planned low-cost provider Adam Internet, in order to maintain dominance, according to the Commonwealth Bank.
The Office of the Australian Information Commissioner has released a comprehensive list of all the questions and factors that it would ask and take into consideration when investigating a data/privacy breach, providing organisations with few excuses to ignore security.
The cloud provides the ability to treat identity management as a service, and treat identities themselves as cloud resources.
Financial services firms and their sensitive data provide tempting targets for hackers. Here's a look at the threat landscape and what the industry can do to protect itself from cyberattacks.
from TechProResearch »
Marking the city government's third breach, over 400 government sites in China's Xuchang City have been hacked and defaced by a hacker from the Pakistan Cyber Army, who posted the details on PasteBin.
From intellectual properly ownership to data security, companies need to tread carefully when formulating a BYOD policy, according to Madgwicks Lawyers partner Dudley Kneller.