U.S. Postal Service pilots an implementation of the Federal Cloud Credential Exchange to facilitate use of government online services.<br style="clear:
Consumer Electronics Shows have launched great technologies like VCRs and HDTVs, but many product reveals turn out to be duds.
Anyone picking up a used Wii U console in this post-holiday lull is in for a nice surprise. It seems
Letter to Office of Civil Rights calls for stronger data security protections, business associate agreements with cloud computing services.<br style="clear:
Amazon Web Services once again cites human error spread by automated systems for loss of load balancing at key facility
NCR is buying uGenius Technology, which makes the software for video ATMs that offer customers remote teller services from a
We’re used to Mars being the red planet, but it probably looked much different in the distant past. What might
Can Ubuntu Linux become the one operating system to run them all — PC, TV and phone?
Every medium- to large-sized company must understand today’s different cloud computing approaches — and pitfalls.
<br style="clear: both"
The looming issue in big data isn’t technology but the privacy and ethics decisions associated with how, when and if
Ice Cream Sandwich and Jelly Bean make big gains over the holidays, now account for 40% of Android installed base.<br
Apple’s iOS platform followed Android, securing 35 percent market share through its iPhone devices.
Weakness in the hardware market is expected to persist in 2013, with purchases of both servers and storage declining and
Reservoir Labs won an $8.7 million contract to deliver new parallel computing software and tools for DARPA’s PERFECT program that
NEWS ANALYSIS: Apple’s Maps application is still suffering from major issues. But there might be ways to fix the problem
NEWS ANALYSIS: The Federal Trade Commission settles with Google on allowing competitors to use standard-essential patents, but drops its investigation
Apple is already testing iOS 7, according to reports. The timing is in sync with reports of an early summer,
A security researcher finds a way to steal information from Web applications designed with Ruby on Rails and using a