- All Computer
- Games & Entertainment
- Linux / GNU "Open Source"
- Microsoft Windows PC
- Operating Systems
View Releases by:
February 20, 2015 -- NovaStor secures former CA VP of Engineering to head global development of the NovaBACKUP product line.
February 20, 2015 -- Software Testing Conference to Offer More than Ninety Learning Sessions over Six Days
February 20, 2015 -- Qosmos remains the networking industry’s top choice for embedded DPI with North America representing strongest growth for the company. An active contributor to the standardization of future network...
February 20, 2015 -- Mobile Dev + Test to Offer a Full Day of Mobile Software Leadership Learning and Collaboration
February 20, 2015 -- “Keeping Pace with an Accelerated Environment”
February 20, 2015 -- Modulo continues to drive industry thought leadership on GRC maturity and innovate GRC automation to help drive next-generation CSOs, CISOs, and CIOs tackling information and corporate security.
February 20, 2015 -- Belkasoft updates its digital forensic solution, Belkasoft Evidence Center 2015, with the ability to perform forensic analysis of Windows Phone 8.1 images acquired via JTAG flashers and Cellebrite...
February 19, 2015 -- 150 CIOs and IT Professionals Will Discuss Emerging Trends in Enterprise IT and Their Impact on Business Efficiency
February 19, 2015 -- Cybersecurity Competition Federation (CyberFed) is proud to announce a new website to promote cybersecurity competitions throughout the nation. The website features pathways to either enter a...
February 19, 2015 -- Eighty of the next generation top cybersecurity specialists will be meeting to compete at the Midwest Collegiate Cyber Defense Competition (MWCCDC) next month at Moraine Valley Community College,...
February 19, 2015 -- An exclusive package of floorspace and services empower SIA to introduce U.S. companies to the robust security marketplace in Brazil.
February 19, 2015 -- Genetec to showcase new solutions on booth #10053, Sands Expo Las Vegas, April 15-17 2015
February 19, 2015 -- New integrated transaction technology allows U.S. merchant to process payments for scannable EMV cards directly within their point of sale system.
February 19, 2015 -- Ace Technology Partners and its affiliate Ace Computers just announced that they have broadcast 3 new custom technology podcasts on their YouTube channel.
February 19, 2015 -- ExamMed’s online virtual care solution, powered by ENKI's High Performance Managed Cloud Service, revolutionizes the way patients and healthcare providers interact.
February 19, 2015 -- Integration of Portnox and OPSWAT GEARS offers customers the level of device visibility, compliance validation and control required to combat today’s growing threat landscape.
February 19, 2015 -- NEXT fingerprint sensor with USB interface ensures reliable operation and convenient user experience
February 19, 2015 -- Verian’s Spring Release Includes Advancements in Analytics, Facilities Management, Mobile and Payment Efficiency
February 19, 2015 -- Sqrrl centers its focus on uniting cybersecurity incident detection and response.
February 18, 2015 -- The latest update to Network Dynamic Corporation’s Sysgem Enterprise Manager will feature more centralized access, so clients can better monitor the various platforms across their entire enterprise.
February 18, 2015 -- Annual List Ranks Innovative Technology Providers and Consultants
February 18, 2015 -- Innovest, a leading provider in trust and wealth management solutions, today announced that Trust Management Network (TMN) has selected Innovest as its fulfillment services provider.
February 18, 2015 -- Amerra, Inc. is creating a universal API toolkit called Amerra Connect for developers to...
February 18, 2015 -- Dutch company Authasas, a world leader in strong authentication solutions for the enterprise market, teams up with Norwegian mass market fingerprint sensor producer NEXT Biometrics.
February 18, 2015 -- In light of recent $1 billion bank hacks, NYC IT Security Consultant urges business leaders to tighten network security to prevent the theft of sensitive data and cash.