Close

Search Results for: Google

What does Google Browser means to me?

Google having their own browser is a move I did not anticipate and is actually a brilliant idea in terms of os replacement for other proprietary operating systems, hence Microsoft.

Google is the 21st Century Mainframe!

All the big guys are rushing these days to launch as many web applications as possible to “captivate” web surfers in their “club”. Google in a dramatic and maybe a

Google’s Aspired Hegemony

After writing yesterday about the launch of Google Pages Beta at Should Google Lead the Web Development Tools Market? I realized that Google has changed profoundly from what they were

Solving Data Privacy Once and For All

The way online services are setup today implies that the only technical means to provide a more personalized experience to customers is to collect as much as possible personal data

Why Privacy Will Remain an Open Issue Unless

2018 was a year of awakening to the dear side effects of technological innovation on privacy. The news from Facebook’s mishandling of users’ data has raised concerns everywhere. We saw

The Emerging Attention Attack Surface

A well-known truth among security experts that humans are the weakest link and social engineering is the least resistant path for cyber attackers. The classic definition of social engineering is

The First Principle of Security By Design

People create technologies to serve a purpose. It starts with a goal in mind and then the creator is going through the design phase and later on builds a technology-based

Softbank eating the world

Softbank acquired BostonDynamics, the four legs robots maker, alongside secretive Schaft, two-legged robots maker. Softbank, the perpetual acquirer of emerging leaders, has entered a foray into artificial life by diluting their

United We Stand, Divided We Fall.

If I had to single out an individual development that elevated the sophistication of cybercrime by order of magnitude, it would be sharing. Codesharing, vulnerabilities sharing, knowledge sharing, stolen passwords,

Taming The Security Weakest Link(s)

Overview The security level of a computerized system is as good as the security level of its weakest links. If one part is secure and tightened properly and other parts

What does cross platform mean?

Cross-platform is tricky. It seems like a small “technical” buzzword but actually, it is one of the biggest challenges for many technology companies and has different aspects for different people

The dark side of Android fragmentation

One of the main problems with Android for app developers contemplating on Android vs. iOs is the fact it is highly fragmented. On iOS you, unconsciously, know that you need

2010 The Decade of Content Discovery

The last decade, 2000-2009, flourished with new content creation tools: blogging, tweets, videos, personal pages/profiles, and many others. One thing that did not catch the speed of innovation on the

The web is changing

I have been reading about the whereabouts of News Corp., Google, and Microsoft in recent two weeks and I noticed something weird happening here about but could not put my

The Web Crawls Silently into the Desktop

Recently I got deeply interested in rich Internet technologies such as Adobe Air and Microsoft Silverlight and it is hard to not see the trend of returning to good old

A Product Roadmap in a Feed

Strategic Board was initially an idea about a new competitive intelligence/market intelligence tool for enterprises in the IT sector. Since then many things have changed including our concept and vision

didn't find what you are looking for?

Search again

Scroll Up