China wants the encryption keys from U.S. technology companies as part of a counter-terrorism law. The draft law leaves U.S. tech giants with two options: Play ball or get out. Read more at ZDNet News Source: Linux
Month: March 2015
Perforce and Interset Deliver Industry's First Intellectual Property Threat Detection Integrated with Source Code and Content Management
by
•Helix Threat Detection Uses Behavioural Analytics to Safeguard Source Code and Other Intellectual Property against Insider Threats, Account Takeovers and Malicious Attacks WOKINGHAM, UK. (March 3, 2015) – Perforce Software and Interset today announced Perforce Helix Threat Detection, a security solution for the Perforce Helix source code management (SCM) and content collaboration platform. The jointly…
Zylpha Survey: Law Firms Are Choosing Innovation To Drive Cost Control, Unlock Profitability And Support Marketing
by
•Legal process automation company Zylpha (www.zylpha.com) has conducted an in-depth survey on the ‘Legal Landscape in 2015’. The survey’s aim is to identify the business and technological challenges facing private sector law firms in the provision of legal services. It also seeks to define the key pressure points on practices in changing times.The accompanying report…
Summit Tech and Alcatel-Lucent Unveil First VoLTE/RCS Connected Car at Mobile World Congress 2015
by
•Barcelona, Spain/Montreal, Canada- March 2nd 2015 – Summit Tech is unveiling the first Voice over LTE (VoLTE)/Rich Communication Services (RCS)-capable Connected Car in collaboration with Alcatel-Lucent (Euronext Paris and NYSE: ALU), a world leading specialist in IP networking, cloud and ultra-broadband technology, at the GSMA’s Innovation City showcase at Mobile World Congress 2015. The two…