Latest from todayLeak reveals Anthropic’s ‘Mythos,’ a powerful AI model aimed at cybersecurity use casesThe draft blog post describes a compute‑intensive LLM with advanced reasoning that Anthropic plans to roll out cautiously, starting with enterprise security teams.By Anirban GhoshalMar 30, 20265 minsArtificial IntelligenceSecurity Kotlin 2.3.20 harmonizes with C, JavaScript/TypeScriptBy Paul KrillMar 27, 20263 minsC LanguageJavaScriptKotlin Final training of AI models is a fraction of their total costBy Maxwell CooterMar 27, 20262 minsArtificial IntelligenceOpenAI adds plugin system to Codex to help enterprises govern AI coding agentsBy Gyana Swain Mar 27, 20265 minsArtificial IntelligenceDevelopment ToolsSoftware Development Anthropic throttles Claude subscriptions to meet capacityBy Anirban Ghoshal Mar 27, 20265 minsArtificial Intelligence Context Hub vulnerable to supply chain attacks, says testerBy Paul Barker Mar 26, 20266 minsArtificial IntelligenceDevelopment ToolsSecurity Visual Studio Code previews chat customizations editorBy Paul Krill Mar 26, 20263 minsDevelopment ToolsIntegrated Development EnvironmentsVisual Studio Code Databricks pitches Lakewatch as a cheaper SIEM — but is it really? By Anirban Ghoshal Mar 26, 20264 minsAnalyticsSecurity Information and Event Management SoftwareSecurity Software Google targets AI inference bottlenecks with TurboQuantBy Prasanth Aby Thomas Mar 26, 20264 minsArtificial IntelligenceDevelopment ApproachesSoftware Development Novell boosts desktop Linux By Paul Krill Oct 4, 2007 2 mins Technology Industry Security vendors bring zombie fighters to life Botnet-infected 'zombie' computers are an ever-growing risk, and IT security vendors are taking notice and offering more ways to fight back By Matt Hines Oct 4, 2007 6 mins Intrusion Detection Software Malware Small and Medium Business Bad things lurking on government sites Several California state Web sites are still redirecting to porn sites even after California's state servers were temporarily removed from DNS listings By Robert McMillan Oct 4, 2007 4 mins Security Small and Medium Business Technology Industry U.S. Net ad spending close to $10B in 2007’s first half Growth in online ad spending is slower compared to the same period last year but is still strong, according to the Interactive Advertisng Bureau By Juan Carlos Perez Oct 4, 2007 2 mins Technology Industry Qualcomm explains failure to provide evidence In its court proceedings against Broadcom, Qualcomm didn't disclose more than 200,000 e-mails showing its participation in a standards-setting process By Nancy Gohring Oct 4, 2007 3 mins Technology Industry Fon’s shared Wi-Fi network goes mainstream with BT BT, the U.K.'s biggest broadband provider, is equipping some customers' routers with Fon technology that lets them share their bandwidth with other nearby Fon members By Stephen Lawson Oct 4, 2007 3 mins Technology Industry Microsoft schedules seven patches for next week Latest updates will affect all versions of Internet Explorer and Outlook Express; other fixes apply to Windows, Word, and SharePoint By Gregg Keizer Oct 4, 2007 2 mins Security Wall Street Beat: Markets roar back, but shadows remain Despite strong gains by Google, Apple, and HP, worries over possible recession keep jubilation at bay By Marc Ferranti Oct 4, 2007 3 mins Technology Industry Jajah cries foul over eBay’s block With a click of an embedded Jajah button, buyers and sellers would've been able to call each other with questions — until eBay banned their use By Juan Carlos Perez Oct 4, 2007 3 mins Small and Medium Business Software Development Technology Industry Rock Phish may be using fast flux in phishing attacks Mysterious hacker group has devised new method that obscures their tracks, deceives researchers, and prolongs life of phishing campaigns By Elizabeth Montalbano Oct 4, 2007 3 mins Security Microsoft launches online e-health service Microsoft's HealthVault helps users store and share their health records online, monitor their medical conditions, and search for health information By Grant Gross Oct 4, 2007 4 mins Software Development Sun patches critical Java bugs Some of the fixes for the Windows, Linux, and Solaris versions of Java Runtime Environment and Java Web Start were rated critical by outside researchers By Gregg Keizer Oct 4, 2007 2 mins Patch Management Software Security Code library aims to fuel easier JavaScript handling The caretaker of jQuery, which compiles and simplifies tested JavaScript code for developers' use, hopes to establish a foundation to expand the project's reach By Jeremy Kirk Oct 4, 2007 3 mins Development Tools Software Development Battling spam revisited, again By Tom Sullivan Oct 4, 2007 2 mins Security Apple fixes year-old QuickTime flaw QuickTime bug was overlooked when Apple patched the media player in March, critics say By Gregg Keizer Oct 4, 2007 2 mins Patch Management Software Security Adobe readies Flex Builder for Linux By Paul Krill Oct 4, 2007 2 mins Software Development Customers upset with Google over Urchin Web analytics software Major upgrade to Google's Urchin Web analytics server software is almost three years late and customers worry that may mean it will be discontinued By Juan Carlos Perez Oct 4, 2007 4 mins Business Intelligence Databases Technology Industry SEC suspends trading of firms susceptible to stock spam Trading suspension of three companies is part of the SEC's antispam initiative that targets 'pump and dump' stock scams By Grant Gross Oct 4, 2007 2 mins Malware Social Engineering Technology Industry Update: Salesforce.com eyes data-sharing service New service would let customers share sales leads, data directly with other companies using Salesforce.com's on-demand CRM software By James Niccolai Oct 4, 2007 4 mins Databases SaaS Technology Industry EU worried that not all operators have cut roaming fees European regulators say there are no signs domestic mobile call prices are being increased to compensate for lost roaming revenues By Paul Meller Oct 4, 2007 3 mins Careers Small and Medium Business Technology Industry Homeland Security e-mail server turns into spam cannon Subscribers to a U.S. government daily e-mail bulletin were inundated with e-mails due to a glitch with its mailing list By Jeremy Kirk Oct 4, 2007 2 mins Endpoint Protection Malware Security How to ask for more money By Tom Sullivan Oct 4, 2007 2 mins Careers Omron demonstrates facial-recognition technology Okao Vision facial-recognition technology recognizes when a person is smiling and ready for their picture to be taken By Sumner Lemon Oct 4, 2007 2 mins Technology Industry Sony spinoff plans high-end FED monitors for 2009 FED technology offers faster response times, consumes less power, and produces more realistic images than other flat-panel technologies By Sumner Lemon Oct 4, 2007 3 mins Technology Industry Feds pull the domain name plug on State of California GSA came within hours of shutting down Web access and e-mail to all state agencies using the ca.gov domain after its servers were hacked with redirects to pornographic sites By Robert McMillan Oct 4, 2007 4 mins Software Development Technology Industry Target sued over Web access for the blind California court extends a disabilities provision to the Internet, rules that Web sites such as Target.com are required to be accessible by the blind By Dan Nystedt Oct 4, 2007 2 mins Careers Security Technology Industry Microsoft gears up for OCS launch Office Communications Server 2007 is due this month, and in the meantime, Microsoft is trying to win over customers to its unified communications offering bit by bit By Stephen Lawson Oct 3, 2007 4 mins Technology Industry Software AG upgrades registry and repository for SOA Infravio, webMethods legacies cited in CentraSite Governance Edition 7.1, which is a rebranding of Infravio's X-Registry By Paul Krill Oct 3, 2007 3 mins Small and Medium Business Software Development Technology Industry eBay: Phishers getting better organized, using Linux Dave Cullinane, eBay's chief information and security officer, says malware developers are creating more sophisticated attacks and using Linux boxes to control botnets By Robert McMillan Oct 3, 2007 3 mins Phishing Security Social Engineering Using virtualization to boost efficiency Data centers accounted for 1.6 percent of total U.S. energy consumption in the U.S., making efficiency, which can be greatly enhanced with virtualization, a must By Rich Lechner Oct 3, 2007 4 mins Software Development Technology Industry Microsoft updates Vista’s speed, stability, again Four separate updates improve Vista's speed, stability, compatability, and reliability, though Microsoft says the 'incremental' fixes are independent from the SP1 update By Gregg Keizer Oct 3, 2007 3 mins Small and Medium Business Software Development Technology Industry Mozilla, Arm, others to build Linux UMPC platform MontaVista, Texas Instruments, Samsung, Movial, and Marvell Technologies also on board to create an open source platform for new device category By Nancy Gohring Oct 3, 2007 3 mins Small and Medium Business Software Development Technology Industry Auditor: FCC leaks information to some lobbyists GAO report finds that FCC violates rules by sharing information in advance with telecom lobby, sometimes at expense of consumer and public-interest groups By Grant Gross Oct 3, 2007 3 mins Careers Security Technology Industry What’s the 411 on GOOG-411? By Ted Samson Oct 3, 2007 5 mins Technology Industry Arm saves battery life with new multicore design Smartphones and mobile devices will benefit the most from processor update By Agam Shah Oct 3, 2007 1 min Technology Industry Microsoft opening up .Net Framework libraries By releasing the libraries under its Reference License and Shared Source Initiative, Microsoft has made the .Net source code viewable but unmodifiable By Paul Krill Oct 3, 2007 3 mins Software Development Alcatel-Lucent board pledges support for Russo Though it is disappointed with the decline in Alcatel-Lucent's financial outlook, the company's board still supports embattled CEO Patricia Russo By Stephen Lawson Oct 3, 2007 1 min Careers The dirty little storage secret By Tom Sullivan Oct 3, 2007 2 mins Fraudsters jump to U.S. to cash out on U.K. cards Fraud involving U.K. credit and debit cards overseas jumped 126 percent for the first six months of 2007; absence of 'chip-and-pin' technology in U.S. blamed By Jeremy Kirk Oct 3, 2007 3 mins Access Control Security Social Engineering Microsoft launches enterprise antipiracy program Get Genuine Windows Agreement aims to plug a hole in Microsoft's antipiracy efforts and targets large customers that need to 'get legal' By Gregg Keizer Oct 3, 2007 4 mins Careers Small and Medium Business Technology Industry Is Adobe vulnerable to an AIR attack? Adobe's support of rich Internet applications could be exposing developers and users to the threat of more Web-based malware By Eric Lai Oct 3, 2007 4 mins Malware Security Malware boom puts pressure on second-tier AV labs Security experts predict only a few of the largest labs will be able to compete in anti-virus research in the long run By Matt Hines Oct 3, 2007 7 mins Malware Phishing Social Engineering Intel seeks growth in India through reference designs As part of Intel's new strategy to create reference designs for India's fast-growing IT market, the company unveils a point-of-sale system for Indian retailers By John Ribeiro Oct 3, 2007 2 mins Technology Industry Broadcom goes high-definition on cell phone chip Broadcom's VideoCore III chip gives cell-phone users access to high-definition video playback, 3D gaming, 12-megapixel camera capabilities — without sacrificing battery life By Agam Shah Oct 3, 2007 2 mins Technology Industry Toshiba platform aims to connect Cell devices Toshiba hopes its Open Connected Media Platform will help spur adoption of the Cell processor by electronics makers By Sumner Lemon Oct 3, 2007 2 mins Technology Industry Toshiba shows off Cell-based SpursEngine coprocessor Prototype Qosmio notebooks include a new multimedia coprocessor that offers better video-processing capabilities and works with high-speed XDR memory from Rambus By Sumner Lemon Oct 3, 2007 2 mins Technology Industry Malicious code infects Chinese security site Chinese Internet Security Response Team's Web site is rigged with a malicious hidden window that can allow code to run on a visitor's PC By Jeremy Kirk Oct 3, 2007 2 mins Endpoint Protection Malware Security How and why Amazon makes you lie By Tom Sullivan Oct 3, 2007 2 mins Software Development Apple competitors tout their phones’ openness versus the iPhone As Apple faces mounting criticism for its measures to keep the iPhone locked, competitors step up to tout how their phones allow third-party development By Nancy Gohring Oct 3, 2007 3 mins Small and Medium Business Software Development Technology Industry StopBadware: Trusted Web sites are being hacked and don’t even know it StopBadware report warns: In a Web 2.0 world, it's becoming easier to sneak badware onto a legitimate site, compromising trusted Web sites By Robert McMillan Oct 3, 2007 4 mins Data and Information Security Databases Malware 1…622623624625626627628629630…1,115 Show me moreLatestArticlesVideos opinion The starkly uneven reality of enterprise AI adoption By Matt AsayMar 30, 20267 mins Artificial IntelligenceDevelopment ToolsTechnology Industry feature How to build an enterprise-grade MCP registry By Bill DoerrfeldMar 30, 202615 mins Artificial IntelligenceDevelopment ToolsGenerative AI analysis Edge clouds and local data centers reshape IT By David LinthicumMar 27, 20268 mins Cloud ArchitectureData ArchitectureHybrid Cloud video How to run your own little local Claude Code (sort of!) Mar 26, 20267 mins Python video How to build desktop apps in Typescript with Electrobun Mar 17, 20265 mins Python video Write and run assembly in Python with Copapy Mar 10, 20265 mins Python