Towards a Scalable Dynamic Spatial Database System
With the rise of GPS-enabled Smartphones and other similar mobile devices, massive amounts of location data are available. However, no scalable solutions for soft real-time spatial queries on large...
View ArticleStandard Chartered Bank Singapore introduces the Security Token Card
Many people in Singapore rely on more than one banking institution and have to carry around multiple security tokens. Find out how the Security Token Card greatly reduces this hassle.
View ArticleVideo conferencing growth and unique challenges in the Asia Pacific region
Analysts report that the use of video conferencing in the Asia Pacific has increased in recent years. Read about three challenges to adopting and using video conferencing in that region.
View ArticleBlackBerry 10 Jam: News for developers in the Asia Pacific region
Paul Mah reports on what he learned during the Asia leg of RIM's BlackBerry 10 developer conference held in Thailand. BlackBerry 10 launch events will be held Jan. 30, 2013.
View ArticleBlackBerry 10: Pros and cons from developers' perspectives
The BlackBerry JamHack 2012 Asia Pacific winner and runner-up share their thoughts about developing for the BlackBerry 10 platform.
View ArticleiTwin adds SecureBox encryption to Dropbox
The latest update to Singapore-based iTwin adds SecureBox encryption for Dropbox. TechRepublic contributing writer Paul Mah has the details.
View ArticlePirated copies of Windows OS in China prone to security issues
PCs running on pirated copies of Windows wide open to malware, says Microsoft. The company has launched an anti-piracy campaign to address such risks.
View ArticleA Geek's Guide to Presenting to Business People
If you see yourself as a geek or a techie, chances are you dread having to present to business people. But with a few simple strategies, you can effectively present to and successfully engage a...
View ArticleIPS: Evolving to Remain Relevant
With constantly changing threats, a shifting network perimeter, and increasingly sophisticated attackers, organizations must adapt both their processes and technologies to keep up. Join guest speaker...
View ArticleIntroducing IBM's Advanced Threat Protection Platform: IBM's Extensible...
Organizations face consistent attacks from outside the organization as well as inside their organization. They must defend a dynamic ecosystem of applications and computer systems from targeted dynamic...
View ArticleCISPA pits privacy against security: A closer look at the issues
The United States Congress is once again considering a bill that could forever change how we as individuals use the internet. Michael P. Kassner looks at what those changes are.
View ArticleA Clustering Approach to Unsupervised Attack Detection in Collaborative...
Securing collaborative filtering systems from malicious attack has become an important issue with increasing popularity of recommender systems. Since recommender systems are entirely based on the input...
View Article