Your browser does not support JavaScript or it may be disabled!
rediff.com
 India As It Happens
Rediff Labs will showcase innovative products that rediff is working on behind the scenes.
News   |   Images
NEWS ON MOBILE
Get Realtime News
on your webpage

About 602 results for "y2k"

16 Things Turning 16 in 2016
Time

16 Things Turning 16 in 2016

We made it through the Y2K freak-out mostly unscathed, but that didn't mean the year 2000 was uneventful. In the new year, these events will hit their 16th anniversaries: The Dow hit its dotcom-boom peak (Jan. 14): The Dow closed at a whopping ... Time, 1 month ago
Market - 16 Things Turning 16 in 2016 E-Servicis.com, 1 month ago

12 images for y2k

InvestorPlace.com, 1 week ago
InvestorPlace.com, 1 week ago
InvestorPlace.com, 1 week ago
Hemmings, 4 weeks ago
Broadway World, 4 days ago
The Express Tribune, 6 days ago
Cleveland Scene, 1 week ago
PortalesNewsTribune, 2 weeks ago
News-Journal, 3 weeks ago
Fooyoh, 1 month ago

Succeeding in the new era of...

The professional services market has altered dramatically since Y2K. In the good old days work seemed to magically appear, generating strong growth in the size and number of professional service providers. Happy times indeed but how things have ...
 Information Age2 weeks ago

But now who will rewrite it once we're past Y2K?

It's 18 months before Y2K, and this database admin pilot fish is settling in as a government contractor on an already troubled project to modernize an application. And then someone upstairs realizes that, hey, it's almost 2000. "Memo came in from ...
 Computerworld3 weeks ago Apple steps away from iAd, gives ad control to publishers  MyInforms3 weeks ago
InfoWorld

A better way to move past insecure SHA-1 certs

Ive written a few times about the pending mini-Y2K issue that is SHA-1 deprecation . In a nutshell, all digital certificates are signed by a hashing algorithm -- and SHA-1 is the signature type used by almost everyone. But SHA-1 has significant ...
 InfoWorld1 month ago
Security Products

Internet browsers to tighten security

to adhere to new security standards to minimise the risk of hacking and prevent a mini-Y2K, or have access to their websites taken away. Over the course of the year browsers like Google Chrome will require tighter security measures if websites ...
 PSNews2 weeks ago Security experts urge websites and apps to adhere to new security standards to prevent 'mini-Y2K'  Goldstein Report1 month ago Websites urged to adhere to new security standards to prevent 'mini-Y2K'  ABC Online1 month ago Websites and Apps Have One Year to Adhere to New Security Measures  Security Products1 month ago
New Zealand Herald

The future according to the CIA

In the year 2000, after the Y2K bug failed to send the world into a computer crash-induced oblivion, people began to think about the future again. The CIA took the future very seriously. So seriously, in fact, that they commissioned government and ...
 New Zealand Herald1 month ago

German retail funds near Y2K's sales high

Germany's fund industry saw net inflows of €9.7 billion in October with retail figures reaching a record level. Equity funds have the highest level of assets under management since 2009 and balanced funds are at an all-time high, according to ...
 Funds Europe2 months ago

Those that can, work. Those that can't...

It's a year or two past Y2k, and this pilot fish's dream IT job is about to turn into a nightmare. "I was working with a fellow named Barney, and the two of us supported all facets of IT for a $7 million manufacturing division of a larger ...
 Computerworld2 months ago
Information Age

The 'Y2K' danger isn't over: why the danger from legacy systems is real

Outdated security systems face the major threat of a security breach Remember Y2K and the fear of a major catastrophic breakdown in all things digital? Well, it's back. But this time, the implications are validated. Legacy software systems are ...
 Information Age2 months ago

Pssst ... Wanna Invest in a Conspiracy?

Our reanalysis of the Y2K-bug data indicates that a genuine control threat predicts people's susceptibility to unrelated conspiracy theories, such as belief in a UFO cover-up, and the belief in a Kennedy conspiracy theory. Indeed, these relations ...
 Before It's News1 day ago
Prev | Next
Personalize your Realtimeclose [x]
Add content to your personalized tab - My News
Add upto 6 topics of your interest:
for eg.2g Scam , World
1.
2.
3.
4.
5.
6.
Personalize the tabs display. ( You can add or remove the tabs )
AlertsGet updates on latest news & your favourite topics right in your inbox.Set an Alert|Manage your Alerts

Get

Realtime News

on your Webpage

Add Widget >Get your members hooked!
    
Alerts
Get updated on latest news & your favorite topics right in your inbox!
 
More     Less