Information technology (IT) accounts for 2 percent of human greenhouse gas emissions worldwide. As more businesses rely on computers, laptops, and similar technologies, the need of sustainable IT will become a dominant trend in the sector.
Consumer demands are driving rapid development in the content industry. As an increasing number of consumers view content on mobile phones and tablets, content providers need to make sure that the content they deliver is optimized for all devices.
Wearable technology may very well be the revolution that brings the world of science fiction into daily lives. With advancements in data compression and transmission, wearables are smaller, faster and smarter than ever. They also do more for the average consumer.
The importance of data security might seem like a no-brainer to most people. Companies that want to avoid lawsuits and bad press about leaked customer information are going to invest in state-of-the-art cybersecurity.
Alas, it’s not that simple.
Date:February 5, 2015
Earlier this week, GHOST, a new security vulnerability in glibc, was announced. Per Redhat’s release:
“GHOST is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library.
Date:January 29, 2015
Linux has been gaining popularity in recent years, and it’s easy to see why. This open-source, flexible platform powered by the GNU comes in multiple flavors and is endlessly customizable from the desktop and GUI right down to the kernel.