"Android’s meteoric rise in popularity is due, in no small part, to the fact it is an open source project." "F-Droid is an Android repository designed to respect the privacy and rights of its users."
One of the reasons Google and VMware have been so successful over the past decade, says Eric Brewer, is that both companies managed to snatch some of the world’s brightest engineers from the big-name research labs that petered out in the late 1990s.
Which companies really scare Google executives?
The two companies seem fated to compete ever more fiercely over mobile computing.
Samsung just took the wraps off its new 10-inch tablet, the Galaxy Note 10.1.
Face capture technology has come a long way, especially as 3-D stereoscopic imaging and the like have made leaps forward in recent years. It’s now relatively easy to capture a face in 3-D and reconstruct it digitally for applications such as the amaz
Samsung has released details about its next-generation Exynos 5 Dual. This is a dual-core mobile CPU based on ARM Cortex-A15 architecture.
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.
Scientists in Switzerland said on Friday they had devised software that can swiftly trace terror suspects, computer viruses, rumour-mongering and even infectious diseases back to their source.
Google's Petr Mitrichev is the all-time champion of competitive programming, a little-known sport where tech giants scout for talent.
Big news: Apple has just scooped up AuthenTec for nearly $360 million.
The next operating system update from Apple will come out on Wednesday, as revealed in the company's earnings call.
A group of 60 or so financial analysts, reporters, diplomats, and cybersecurity specialists shake off the previous night’s tequila and file into a ballroom at the Ritz-Carlton hotel. At the front of the room, a giant screen shows a globe targeted by
The software behind the film "Minority Report" -- where Tom Cruise speeds through video on a large screen using only hand gestures -- is making its way into the real world.
With nothing more than money and a little online savoir faire, you can buy weapons—Glocks, Berettas, PPKs, AK-47s, Bushmaster rifles, even a grenade—in secret, shipped anywhere in the world.
In 2008, a team of software coders inside the National Security Agency started reverse-engineering the database that ran Google.
The computer industry's future depends on a behind-schedule technology that's proving tough to get working.
As government agencies in the United States, the United Kingdom, Canada, and Australia push for increased surveillance powers, one pioneering American is pushing back.
As part of its purchase of Perceptive Pixel today, Microsoft will start selling giant tablets running Windows 8.
Microsoftjust demonstrated a feature of Windows 8 called Windows To Go that lets you store Windows 8 on a USB drive and use it on other PCs.
Amazing speacial effects video
About a quarter-million computer users around the world are at risk of losing Internet access on Monday because of malicious software at the heart of a hacking scam that U.S. authorities shut down last November.
The chipmaker gets some marquis partnerships.
Burglary reports dropped after officers began taking patrol orders from computers.
As we upload more and more videos to the Internet—one hour of new video every second to YouTube alone—experts are finding new ways to mine them.
Microsoft has agreed to purchase Yammer, a San Francisco startup that offers a Facebook-like social network designed specifically for businesses.
Apple has made a small change to a Mac marketing webpage that is a big deal to people who care about computer security.
Nirmalya Kumar: India's invisible innovation
The United States government is developing a computer system that would allow it to conduct cyber warfare without the intervention of a human programmer.
Terror group Lashkar-e-Taiba has developed its own VoIP network that connects its members over GPRS networks. The network is frustrating India's intel community, as it is far harder to spy on than email or commercial VoIP services.