July 2009

  • iPhone leads to cannabis stash

    Karl Flinders - Emea Content Editor, Computer Weekly 20 Jul 2009
  • iPhone users can now buy an application that guides them to the nearest supply of Cannabis. This is obviously for medicinal purposes in US states where the drug has been approved for medical ...

  • Out of the mouths of babes and sucklings

    ComputerWeekly Staff 15 Jul 2009
  • A 15 year-old intern at Morgan Stanley investment bank caused controversy this week when he wrote a report about teenagers' consumption of media. Teenager Matthew Robson raised eyebrows when he ...

  • Scottish sheep taggers get cash let off

    Karl Flinders - Emea Content Editor, Computer Weekly 15 Jul 2009
  • Scottish sheep farmers have won a ruling in Europe that means they will not have to fork out for sheep tag readers. Legislation emanating in Europe will mean sheep have to be tagged but farmers ...

  • USB powered chainsaw released

    Karl Flinders - Emea Content Editor, Computer Weekly 09 Jul 2009
  • Downtime was amazed to see that you can now buy a chainsaw that plugs into your computer's USB port.Lumberjacks everywhere will be swarming to buy the latest computer gadget. Chop trees while you ...

  • Snakes alive - it's a spy robot!

    Warwick Ashford - Security Editor 03 Jul 2009
  • Technology is taking inspiration from nature with Israeli military scientists creating a robotic snake to spy on enemies and plant bombs. Presumably having giving up trying to train their pet ...

  • Petty thief nabbed by caller-ID technology

    Warwick Ashford - Security Editor 03 Jul 2009
  • Cybercrime is flourishing because some criminals are among the most tech-savvy people on the planet, but it seems some petty thieves still have a lot to learn. In particular, Torbay teenager Jake ...






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...