FILTER RESULTS
FILTER RESULTS
close.svg
Search Result for “social security system”

Showing 2,981 - 2,990 of 3,002

TECH

Inet looking to finalise data centre deal with Malaysian firm

Database, Sasiwimon Boonruang, Published on 07/04/2010

» To tap the potential of Internet data centre business, Internet Thailand (Inet) will expand its present Internet Data Centre (IDC) by teaming up with a Malaysia-based company.

Image-Content

TECH

A hands-on approach to HR

Database, Don Sambandaraksa, Published on 31/03/2010

» A Thai software company is leading the way in providing software and services to automate much of the work of HR managers, be it simple payroll processing or recruitment, or psychometric evaluation, in order to help develop the HR function in companies to make the role more professional and strategic.

Image-Content

TECH

Social network hackers employ abuse of trust

Database, Suchit Leesa-nguansuk, Published on 24/03/2010

» Hackers are now taking advantage of trusted friendships in social networks by mimicking the identities of users and luring their connections into attacks.

Image-Content

TECH

Today's 10 most common security threats on the Net

Database, Sasiwimon Boonruang, Published on 24/03/2010

» The growth of the Internet as a ubiquitous part of life has made social networks and mobile devices more vulnerable to attack, with the users themselves often the weakest link.

TECH

Why the Y2K threat was very real

Database, James Hein, Published on 24/03/2010

» To this day I still sometimes read about the Y2K bug and how it was a hoax. I sometimes see it likened to all manner of conspiracies. So here is the truth. I was involved in the Y2K mitigation program and it was a real issue. Jan 1, 2001 and other dates like 2010 were real issues and in fact they are still having an effect today.

Image-Content

TECH

Technology promises a safer, more convenient community life

Database, Borisuthiboun Dasaneyavaja, Published on 17/03/2010

» It's time to live a smart life. At least for the residents of Magnolias housing estate.

TECH

With Facebook, get scene, seen and heard

Database, Gotfried. K, Published on 10/03/2010

» Lots of people still have MySpace pages. But what the heck are they? Well, they are the vanguard of the "social media" movement. A MySpace page is basically a page where you put out all sorts of personal information about yourself and then you invite your friends to come have a look, and, if they like what they see, to do the same. You can post photos, videos, embedded YouTube videos, and so on.

TECH

Gamers, DIY markets to receive boost

Database, Sasiwimon Boonruang, Published on 03/03/2010

» The Aspirers Group (TAG) has teamed up with partners to build a new type of trade show with "Creative Extreme DIY" and "Reality LAN Party" at ComWorld 2010 from April 29-May 2 at Siam Paragon.

TECH

Need to know

Database, Published on 17/02/2010

» The US Federal Bureau of Investigation began a campaign to force all Internet providers in the United States to record and file all web activity by all users, all the time, in case the FBI ever needed the information; FBI director Robert Mueller said he wants storage of "origin and destination information," able to be retrieved with a search warrant issued by a judge in important cases such as terrorism, kidnapping, criticism of FBI and the like; in a huge, shocking coincidence, pretty well every US state investigation bureau backed the FBI proposal, because you never know when a state prosecutor might need information about the surfing habits of a nefarious outlaw, paedophile or political opponent, not that top investigators would ever stoop to asking for politically related surfing records, perish the thought; the FBI, by the way, does not want actual data such as email retained, only the information recording the origin and destination of a web session - for now.

TECH

Social sites, cloud computing pose new threats

Database, Suchit Leesa-nguansuk, Published on 27/01/2010

» The increasing popularity of social networking and new technology development in cloud and virtualisation environment as well as new operating systems create loopholes for security threats in 2010.