Latest from todayLeak reveals Anthropic’s ‘Mythos,’ a powerful AI model aimed at cybersecurity use casesThe draft blog post describes a compute‑intensive LLM with advanced reasoning that Anthropic plans to roll out cautiously, starting with enterprise security teams.By Anirban GhoshalMar 30, 20265 minsArtificial IntelligenceSecurity Kotlin 2.3.20 harmonizes with C, JavaScript/TypescriptBy Paul KrillMar 27, 20263 minsC LanguageJavaScriptKotlin Final training of AI models is a fraction of their total costBy Maxwell CooterMar 27, 20262 minsArtificial IntelligenceOpenAI adds plugin system to Codex to help enterprises govern AI coding agentsBy Gyana Swain Mar 27, 20265 minsArtificial IntelligenceDevelopment ToolsSoftware Development Anthropic throttles Claude subscriptions to meet capacityBy Anirban Ghoshal Mar 27, 20265 minsArtificial Intelligence Context Hub vulnerable to supply chain attacks, says testerBy Paul Barker Mar 26, 20266 minsArtificial IntelligenceDevelopment ToolsSecurity Visual Studio Code previews chat customizations editorBy Paul Krill Mar 26, 20263 minsDevelopment ToolsIntegrated Development EnvironmentsVisual Studio Code Databricks pitches Lakewatch as a cheaper SIEM — but is it really? By Anirban Ghoshal Mar 26, 20264 minsAnalyticsSecurity Information and Event Management SoftwareSecurity Software Google targets AI inference bottlenecks with TurboQuantBy Prasanth Aby Thomas Mar 26, 20264 minsArtificial IntelligenceDevelopment ApproachesSoftware Development Sun Niagara 2: The eight-core sequel Sun calls its new processor, which features eight cores supporting 64 threads of processing capacity and chip multithreading, a 'server system on a chip' By Robert Mullins Aug 6, 2007 3 mins Technology Industry Mozilla: 10-day patch guarantee ‘not our policy’ Browser maker rescinds executive's pledge made during late-night festivities at Black Hat conference By Robert McMillan Aug 6, 2007 2 mins Security Amazon invests in music service Amie Street Looking toward the launch of its own digital music store later this year, online retailer invests in Amie Street, which sells DRM-free music on the Web By Nancy Gohring Aug 6, 2007 2 mins Technology Industry FTC to examine targeted advertising An open house on the security and business practices of targeted advertising is scheduled for November 1-2 By Grant Gross Aug 6, 2007 3 mins Careers Security Technology Industry Microsoft, NASA offer 3D photos of Endeavour NASA gave Microsoft 'unprecedented' access to the space shuttle, allowing the company to take pictures that will then be used in Photosynth 3D renderings By Elizabeth Montalbano Aug 6, 2007 3 mins Small and Medium Business Software Development Technology Industry Running Windows on Macs becomes a race with VMware Fusion out of the gates Desktop virtualization leader VMware takes aim at main Windows-on-Mac rival Parallels By Elizabeth Montalbano Aug 6, 2007 2 mins Small and Medium Business Software Development Technology Industry Separating data from the UI By Tom Sullivan Aug 6, 2007 2 mins Careers Apple plans iMac desktop upgrade Apple is expected to announce a new generation of iMacs with a slimmer design, industry watchers say By Ben Ames Aug 6, 2007 3 mins Small and Medium Business Software Development Technology Industry Wipro to acquire US services provider Infocrossing Indian outsourcer to pay $600 million to provide better hosted and managed IT infrastructure services By John Ribeiro Aug 6, 2007 2 mins Managed Cloud Services SaaS Technology Industry Nokia Siemens joins Linux Foundation By Paul Krill Aug 6, 2007 2 mins Software Development Nokia Siemens joins Linux Foundation By Paul Krill Aug 6, 2007 2 mins Software Development NY Times reveals Forbes editor as ‘Fake Steve Jobs’ Senior editor with Forbes magazine posed as Apple CEO for more than a year on a popular satirical blog By Gregg Keizer Aug 6, 2007 3 mins Software Development Technology Industry Impact of Samsung power outage less than feared Production lines are back up, easing fears of disruption in supply of NAND flash memory chips to iPhones and other devices By Dan Nystedt Aug 6, 2007 2 mins Technology Industry Wikiversity eyes strong growth over next few years Wikimedia Foundation project is creating a free learning community that provides educational materials and courses online By Dan Nystedt Aug 6, 2007 3 mins Software Development Wikipedia: Baidu may be worst copyright violator Wikimedia has no plans to sue Baidu, but is asking the Chinese search company more publicly to respect its copyright license By Dan Nystedt Aug 6, 2007 4 mins Databases Software Development Lenovo to sell $198 PC in China New Lenovo PCs are designed to make computer ownership available to 3 million new, rural Chinese users By Steven Schwankert Aug 6, 2007 2 mins Technology Industry Nokia to use Microsoft’s PlayReady DRM software By licensing Microsoft's latest DRM software, Nokia gives its service providers a greater choice of copy protection By John Blau Aug 6, 2007 3 mins Intellectual Property Small and Medium Business Technology Industry Mozilla vows to patch any critical flaws in 10 days Security experts say Mozilla may find it difficult to keep the 10-day promise By Jeremy Kirk Aug 6, 2007 3 mins Patch Management Software Security Technology Industry IBM Information Server Blade does data integration Appliance-like blade system with Information Server reconciles and integrates data from multiple sources By Eric Knorr Aug 6, 2007 2 mins Application Integration Software Development Technology Industry Congress to probe Yahoo over jailed China journalist Congressional committee to investigate whether Yahoo lied during testimony over its role in a human rights case in China By Dan Nystedt Aug 6, 2007 3 mins Databases Software Development Should you ever take a pay cut? By Tom Sullivan Aug 6, 2007 2 mins Careers Websense lures Web 2.0 attackers with HoneyJax Threat detection system is designed to root out attacks on social networking sites, blogs, and wikis soon after they are launched By Robert McMillan Aug 6, 2007 1 min Intrusion Detection Software Security Software Development Open source lands in the enterprise with both feet Major business applications on Linux turns OS into a commodity By Ephraim Schwartz Aug 6, 2007 3 mins Open Source Software Development California tightens security rules on e-voting machines California's Secretary of State officially decertified three voting systems, then recertified them with a number of conditions added By Robert Mullins Aug 4, 2007 3 mins Security Software Development Update: Dateline NBC ‘mole’ outed, booted at Defcon In a story of betrayal worthy of an episode of Dateline NBC, undercover producer Michelle Madigan was exposed and forced out of the conference on Friday By Robert McMillan Aug 4, 2007 4 mins Malware Phishing Social Engineering Defcon hacking conference infiltrated by ‘media mole’ Defcon organizer Dark Tangent claims that a producer from Dateline NBC is at the conference with a hidden camera By Robert McMillan Aug 3, 2007 2 mins Security Texas company files suit against Microsoft, Adobe Aloft Media is suing Microsoft and Adobe for infringing on patents related to the GUI that displays URLs in a Web browser By Elizabeth Montalbano Aug 3, 2007 2 mins Technology Industry Kittens — the solution to spam? In an effort to stay ahead of spammers, Microsoft is experimenting with technology that asks users to identify a picture subject before they can create a Hotmail account By Nancy Gohring Aug 3, 2007 4 mins Malware Security Mozilla shares scanning tool, Firefox 3 features Company reps highlight measures against malware contained in both releases, but also cite goal of fostering more secure coding practices among programmers By Matt Hines Aug 3, 2007 4 mins Malware Patch Management Software Social Engineering Data leak products have security risks At the Black Hat conference, Matasano researchers presented research showing that many security products introduce new flaws to a system By Robert McMillan Aug 3, 2007 4 mins Data and Information Security Databases Endpoint Protection Study: IRS security vulnerable to social engineering Sixty percent of IRS employees fell for a 'social hack' in which a caller pretends to be a help desk worker and asks the employee to change their password By Grant Gross Aug 3, 2007 3 mins Careers Security Technology Industry IBM to buy Princeton Softech IBM will add Princeton Softech's data archiving and privacy compliance monitoring software to its data management arsenal, expanding its Information on Demand strategy By Stephen Lawson Aug 3, 2007 2 mins Technology Industry Companies of all sizes going green Green IT practices are taking hold everywhere from big bellwether companies like Xerox to SMBs like Useful Corp. By Nancy Weil Aug 3, 2007 5 mins Software Development Technology Industry The realities of green computing Many companies are touting their green business practices, and while e-cycling and other green programs are increasing, e-waste remains a major global issue By Nancy Weil Aug 3, 2007 8 mins Software Development Technology Industry Cringe: MS is millipede of software makers By Tom Sullivan Aug 3, 2007 2 mins Software Development SIA: Price cuts hurt chip revenue in first half of year Semiconducter revenue growth was just 2.1 percent for the first half of 2007 as price cuts ans excess inventory benefit consumers but hurt vendors By Ben Ames Aug 3, 2007 2 mins Technology Industry Business Objects tries Web 2.0, gets mixed reviews BI 2.0 prototype tools seen as creative, just not necessarily valuable By James Niccolai Aug 3, 2007 4 mins Business Intelligence Databases Technology Industry IBM to bury BlackIce by next year Big Blue says it will stop offering desktop and server protection for consumers By Jeremy Kirk Aug 3, 2007 2 mins Endpoint Protection Security U.S. man sentenced to two years on copyright violations Timothy Hall also gets $1,200 fine By Grant Gross Aug 3, 2007 2 mins Software Development Black Hat tilts toward business users Corporate IT managers comprise an estimated 42 percent of hacker confab attendees By Matt Hines Aug 3, 2007 4 mins Security EC lists roaming slowpokes Not all of the European Union's mobile phone operators have complied with a price cap on cross-border phone calls By John Blau Aug 3, 2007 3 mins Small and Medium Business Software Development Technology Industry iPhone memory chip supply could be disrupted by power outage at Samsung plant Power outage halts Samsung production and could lead to a severe shortage of NAND chips, analysts say By Jeremy Kirk Aug 3, 2007 1 min Technology Industry Nissan turns to high-tech to stop drunk driving Prototype high-tech sensors are part of Nissan's Vision 2015 plan to halve deaths in accidents that occur involving its vehicles By Martyn Williams Aug 3, 2007 3 mins Security IT can’t help users By Tom Sullivan Aug 3, 2007 2 mins Software Development Acer trails in China despite global growth Acer has gained ground against top competitors in Europe and North America, but its revenue in China declined 16 percent By Sumner Lemon Aug 3, 2007 3 mins Technology Industry Virus attack on single e-voting machine could tilt election Review of Deibold's source code shows an attacker with access to a one electronic voting machine could change the outcome of an election using viruses By Sumner Lemon Aug 3, 2007 3 mins Malware Security Update: Microsoft cuts Windows Vista price in China Chinese users have long complained that Microsoft's software prices were unrealistically high, given local incomes By Sumner Lemon Aug 3, 2007 2 mins Small and Medium Business Software Development Technology Industry Open source joins the mainstream LinuxWorld Conference attendees are judging open source software by the same criteria they judge proprietary software, opening up more opportunities By Robert Mullins Aug 3, 2007 4 mins Open Source Software Development Google phone won’t be about “voice ads” By Ted Samson Aug 3, 2007 3 mins Technology Industry VCs see tight market for security startups According to Black Hat Conference attendees, security had been a hot market, but overcrowding and less-than-anticipated return on investment have cooled investors By Robert McMillan Aug 2, 2007 3 mins Security 1…643644645646647648649650651…1,115 Show me moreLatestArticlesVideos feature How to build an enterprise-grade MCP registry By Bill DoerrfeldMar 30, 202615 mins Artificial IntelligenceDevelopment ToolsGenerative AI opinion The starkly uneven reality of enterprise AI adoption By Matt AsayMar 30, 20267 mins Artificial IntelligenceDevelopment ToolsTechnology Industry analysis Edge clouds and local data centers reshape IT By David LinthicumMar 27, 20268 mins Cloud ArchitectureData ArchitectureHybrid Cloud video How to run your own little local Claude Code (sort of!) Mar 26, 20267 mins Python video How to build desktop apps in Typescript with Electrobun Mar 17, 20265 mins Python video Write and run assembly in Python with Copapy Mar 10, 20265 mins Python