Searched for: "hacking second life"
- Security (14)
- Hardware (7)
- Mobility (7)
- Microsoft (6)
- Networking (5)
- Open Source (5)
- After Hours (4)
- Innovation (3)
- Social Enterprise (3)
- Software (3)
- Cxo (2)
- Data Centers (2)
- Enterprise Software (2)
- Tech & Work (2)
- Apple (1)
- Banking (1)
- Collaboration (1)
- Data Management (1)
- Developer (1)
- Google (1)
About 71 results for "hacking second life"
As the Turing Phone nears its launch the device's makers reveal their plans to push forward smartphone capabilities and battery life.
Jesus Vigo takes a look at each of Apple's OSes as announced during the recent annual event and reviews the new features and functionality as they apply to businesses and enterpris...
When making the case for investing more money in IT security, reference the Ashley Madison hack as an example of what you don't want to happen at your company.
IBM, in partnership with Samsung, GlobalFoundries, and SUNY Poly CNSE, has developed a working 7 nanometer chip. Here's how it will change the materials and processes in semiconduc...
Virality is often a mystery. Here are five videos from brands that have done really well and are actually worth watching.
Boards are a great way to organize your brand's Pinterest account.
Today, computer and Internet network are essential part of everyone life. A number of personal transactions occur every second and computer network are mostly used only for transmi...
Jesus Vigo reviews the multi-factor authentication protection offered by Sesame 2 for modern Mac desktops or laptops.
Of the 10,000-plus staff at the Government Code and Cypher School during World War II, two-thirds were female. Three veteran servicewomen explain what life was like as part of the ...
Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the serious consequences of the fi...