Special Forces, Marines Embrace Palantir Software
Military Special forces and Marines are embracing the commercial software Palantir for analyzing battlefield intelligence even as the Army seeks to downplay its effectiveness, according...
Hasta la Vista, AltaVista
AltaVista is shutting down, and if you find that the least bit surprising, it's probably because you're shocked to discover it still exists. Well, it...
Microsoft’s Windows 8.1 public preview: What you need to know
Summary: Here are all the download links and info you need to know if you want to test drive Windows 8.1, codenamed "Blue." Today's the...
Leaked iPhone 5S Prototype Is Pretty Much Everything You’d Expect
Last week, we shared a pair of photos of Apple's upcoming iPhone 5S, revealing a few details such as a larger-capacity battery and a new...
Report: Windows 8.1 Preview ISO files to be released by Microsoft
Microsoft has already announced that current Windows 8 users can download the upcoming public preview version of Windows 8.1 via the Windows Store on June...
Is Apple Facing A Designer And Developer Revolt Over iOS 7?
iOS 7 is one of the biggest changes for the iPhone and iPad since…. the iPhone, a stunning new interface according to Apple AAPL -0.8%...
Facebook issues data breach notification – may have leaked your email and phone number
Facebook just published a data breach notification on its security blog. You might not immediately notice that from the title of the article, which announces...
[Video] Tiny wooden audio speaker turns glasses into Equalizer
Chances are you've used an audio equalizer before, and chances are there was a lot of blindly turning dials and hoping something good happened. The...
Facebook now allowing photo comments.
Facebook has started to roll out photo comments, a new feature that allows you to comment on posts with images rather than words. (more…)
Microsoft will pay up to $100K for new Windows exploit techniques
Microsoft has announced that it will give security researchers cash rewards for devising novel software exploitation techniques, creating new exploit mitigation systems, and finding bugs...