Manage business database applications.
Ending the NSA's massive phone database is just one recommendation in a report from the White House's surveillance review panel.
The database contains stolen usernames and passwords associated with Facebook, Twitter, Google, Yahoo, and more.
After users' hashed passwords, e-mail addresses, and other information is exposed in a security breach, the cloud-based hosting service neutralizes the attack and works to prevent future incidents.
Oracle's founder, who stepped down Thursday as CEO, has carved out a unique -- and sometimes controversial -- persona as a titan of tech.
From critical exploits to the tiniest bug, many security holes receive a tracking number through the US government. The system is being revamped to handle the ever-growing number of bugs, but the cure could create problems of its own.
The new series of smart appliances will use the Home Connect standard to sync up with users, and each other.
More than 2.6 million images from public domain e-books have been uploaded to Flickr as part of an Internet Archive project -- with 12 million more to come.
A team of international scientists has spent four years painstakingly cataloguing every known living organism in the Southern Ocean.
Project Hemisphere, which was detailed in slides supplied to The New York Times, included access to phone logs dating back 26 years.
Newly released documents leaked by Edward Snowden reveal that the NSA isn't just collecting data -- it's also got a custom search engine to carry out the task.