Microsoft Announces The Final Version Of Windows

Microsoft Ignite

Images from the Microsoft Ignite conference where the company made the announcement. In a statement at the Ignite 2015 conference Microsoft released news that it plans to change its software methodology with future OS upgrades. Windows will evolve in increments, instead of the standalone versions, in an “ongoing manner”. Microsoft employee More...

by James Li | Published 9 years ago
Photobucket
By James Li On Sunday, May 10th, 2015
0 Comments

PhotoBucket Hackers Prosecuted On Conspiracy And Fraud Charges

Photobucket faced security flaws within its users private image folders. Federal prosecutors indicted and prosecuted two men on Friday with conspiracy and fraud charges after allegedly breaching the computer systems More...

Spotify
By James Li On Friday, May 8th, 2015
0 Comments

Only Content Producers & Consumers Win From Spotifys Move To Video

Spotify already dominates the free music streaming market and is now considering entering the video streaming market. The current market for video streaming is filled with many new services. This is fantastic news More...

World Of Warcraft
By James Li On Thursday, May 7th, 2015
0 Comments

Activision Blizzard To Focus On Online Services

The World of Warcraft owner is seeing it’s profits slide. Creators of the popular video games Call of Duty and World of Warcraft, Activision announced this Wednesday that they will reorient their sales towards More...

iPhone 6 & iPhone 6+
By James Li On Thursday, May 7th, 2015
0 Comments

iPhone 6 Plus Leads Sales On “Phablet” Market

The iPhone 6 compared to the iPhone 6+ which has been nicknamed a Phablet. The smartphone market nowadays offers various options for its users trying to satisfy different needs of people. Variations offered are More...

Compromise Flow Chart
By James Li On Monday, May 4th, 2015
0 Comments

New Rombertik Virus Can Attack Your Hard Drive

The compromise flow of the viruses operations as explained by Talos. A computer virus named Rombertik which avoids detection by making the PC it infects inoperative has been identified. Rombertik is distributed More...

Navigation