Technology

6 reasons why you should use OpenAPI specification for your APIs

If the term “API Specification” seems intimidating for newbie developers, take comfort in the fact that the idea is not necessarily an unfamiliar one. Simply think of an elaborate toy car or toy robot...

Top 10 web design trends in 2021

Who doesn’t want a great website design that stands out in the online world? Of course, everyone wants to get a creative showcase for their products and services. Adobe surveyed 2,000 consumers few ye...

Epsilon Becomes a London Internet Exchange Platinum Partner

Epsilon has been awarded Platinum status by the London Internet Exchange (LINX) under its ConneXions Partner Programme. The upgrade comes after a recent significant expansion of Epsilon’s managed capa...

Cybersecurity market in India to reach $3 billion by 2022: DSCI-PwC Report

With increasing technological advancements in India, the vulnerabilities in these technologies have also increased causing it to be exploited by threat experts of the cyber world for their own benefit...

Japan’s SBI Holdings Makes a $20m Strategic Investment in OpenLegacy

SBI’s investment accelerates its Internet banking and Moneytap initiatives while opening the door for OpenLegacy to the world’s second-largest mainframe market after the United States. Tokyo-based SBI...

Raritan Introduces Economical New Generation KVM-Over-IP Switch and Serial Access for SMBs

Raritan® — a brand of Legrand®, and a leading provider of intelligent data center management and rack power distribution solutions, introduced its new generation KVM-over-IP switch designed for small ...

Cloud backup and recovery feature now available for Microsoft Authenticator on Android

Microsoft has announced the availability of cloud backup and recovery for the Microsoft Authenticator app on Android. Now, Android users can use this feature to back up their credentials to cloud, and...

Millions of Exim email servers vulnerable to cyber attacks

A critical vulnerability has been found in millions of Exim servers which once exploited can enable potential attacker to run arbitrary code with root privileges. All versions of Exim servers up to an...

Firefox 69 enables Enhanced Tracking Protection by default

Mozilla has released a new version of Firefox browser in order to strengthen the security and privacy for users. The Foundation quietly made announcement last week in a blogpost. With release of Firef...

Microsoft unveils ICECAPS to power chatbots with multiple personas

Microsoft Research team has open sourced a new toolkit for conversational modelling that will allow developers and researchers to power their chatbots with multiple personas. Called Intelligent Conver...

Australian Signals Directorate open sources its in-house data visualization tool

ASD (Australian Signals Directorate) has open sourced its in-house data visualization and analysis app on the code repository, GitHub. Dubbed as Constellation, the software is framed with powerful ana...

Serious security issue found in 40+ device drivers from 20 vendors

At the DEF CON 27 security conference in Las Vegas, Eclypsium security research team uncovered serious security flaws in more than 40 device drivers from 20 different vendors. These flaws could allow ...

Page 1 of 30
1 2 3 30