SDN is a technology that promises to be the next big thing not only for IT organisations and networking vendors, but also for service providers, says Muhammad Rehan Sami, Senior Solution Architect, Business, Etisalat

SDN is a technology that promises to be the next big thing not only for IT organisations and networking vendors, but also for service providers, says Muhammad Rehan Sami, Senior Solution Architect, Business, Etisalat
SimpleAir is seeking $125M in damages from Google after a jury found that push notification services in Android infringe on a SimpleAir patent, the company said Tuesday.
By 2017, the typical mobile user will share their personalised data stream with 100 applications and services every day, with wearable devices and Internet-connected appliances fueling the use trend, according to Gartner.
A list of 16 million email addresses and passwords has fallen into the hands of botnet operators, the German Federal Office for Information Security (BSI) said Tuesday.
The Syrian Electronic Army claimed credit for grabbing control of a pair of Microsoft company Twitter accounts and the firm’s primary blog for a short time Saturday.
Yahoo has started to automatically encrypt connections between users and its email service, adding an important security layer that rival Gmail has had for almost four years, but its implementation needs work, according to one security expert.
It has launched a flagship company website along with other social media sites such as Facebook, Twitter and LinkedIn.
Ford CEO Alan Mulally, seeking to end speculation over a possible move to Microsoft, told the Associated Press on Monday that he will not become the software company’s next CEO.
Kaspersky Lab experts have discovered that PC gamers around the globe were hit by 11.7 million attacks in 2013.
Skype said its social media properties were targeted, with the Syrian Electronic Army appearing to claim credit for the hacks.
Phone numbers paired with user names of over 4.6 million alleged Snapchat users were posted online by hackers, a few days after a security research group claimed a vulnerability in the social sharing service that could allow attackers to match phone numbers to Snapchat accounts.
Cast your mind back to the late 2000s – when the iPhone 3G beguiled consumers and the iTunes App Store began shifting users’ ideas about how they bought and used software. When Microsoft pros saw nothing but clear skies after Windows 7 cleared out the Windows Vista storm, and when green technology was touted as a transformative force in IT.
Oracle is gearing up to report its second-quarter earnings Wednesday and given the restrained expectations CFO Sandra Katz earlier set for key areas such as software revenue, Oracle’s results are sure to come under even more scrutiny than the tech bellwether already gets.
If you shudder when hearing the words “network-attached storage” you can at least take solace knowing that you aren’t alone.
The French Senate has passed a law giving government officials warrantless access to live login and user location data from ISPs and websites, angering internet companies and human rights groups.
Critics of the U.S. National Security Agency’s bulk collection of U.S. residents’ telephone records should offer a better way to track terrorists and protect the country against attacks, the agency’s director said Wednesday.
Miniature tablets are becoming more and more popular, with devices like Google’s Nexus 7 and Apple’s iPad mini in the vanguard. Acer tried to bring Windows to the mini form with its Iconia W3 earlier this year, but that tablet was hampered by an awful screen, a bulky chassis, and a slow processor.
And it was all going so well. As vendors began to build more comprehensive cloud-based product roadmaps, Middle Eastern users were beginning to see just how cloud services can streamline their businesses. According to a Gartner report from earlier in the year, cloud adoption was due to grow monumentally in the region up to 2016. This was largely due to issues surrounding security and compliance being ironed out.
As Bitcoin’s popularity grows, so does talk about its standing as legal tender, but there are lingering issues that need to be sorted out before people start using Bitcoin to buy everyday things, experts said on Monday.
On any given day cybercriminals and nation states are in possession of as many as 100 zero-day software exploits known only to them, NSS Labs has calculated using the commercial vulnerability market as a baseline.