
Rad retro robots made from junk
Small and midsize businesses know security is not optional. From risk assessment and compliance policies, to cybercrime prevention, it's your number one priority. More...

Tw telecom Awarded State of Texas Services Contract For Statewide Communications Services
NewswireToday - /newswire/ - Austin, TX, United States, 08/12/2011 - Agreement makes available leading networking solutions to all State of Texas departments and agencies - twtelecom. More...

Don't be so quick to buy that tablet; other options coming soon
Is there a slate computing device in your future? If you don't already have an iPad, you may want to wait and see how this new category of systems shakes out over the at once year. More...

Manx Telecom launch Intelligent Voice system
The system, which is based on the Broadsoft communications platform, uses VoIP (Voice over Internet Protocol) research to deliver free calls between all users in a business - even if they are located at different sites. More...

FTS' Charging and Billing in the Cloud Successfully Deployed by Australian Billing Bureau
FTS, a global provider of billing, customer care and policy control solutions for communications and content service providers, today announced that an Australian billing bureau has deployed its FTS express product on virtual platforms and in the cloud. More...

The second edition of Apple Talk Weekly
Welcome to the second edition of Apple Talk Weekly, a look back at the week's top Apple news and rumors, along with answers to your Apple questions. More...

New VoIP phones installed Monday
SUNBURY - Installation of a new telephone system that will save Northumberland County in broad outline $90,000 annually afterwards loans are paid, according to county officials, will begin on Monday with the rewiring of the county court house. More...

Google Applications Case Study
The convergence of voice and data networks has been evolving and gaining momentum for several years. Organizations that are implementing Voice over IP in an effort to cut communications costs or leverage the competitive advantage of integrated services shouldn't overlook the security risks that arise as voice and data converge. More...

Program aids teen computer literacy
Learning to use smartphones, tablets, netbooks and the cloud can be a bit daunting to anyone, however several highly trained local teens are ready to help those lost in the land of fiber-optics and gigabytes. More...

NAND flash can verify a device's identity
"There's a lot of counterfeit in the [supply] chain," said analyst Roger Kay of Endpoint Innovation Associates. It can be hard to detect, because the chain is not always as simple as a device maker contracting with one flash manufacturer to supply the chips for an entire production run of consumer devices, he said. More...