OXIESEC PANEL
- Current Dir:
/
/
var
/
www
/
reader
/
_backup
/
rssfeeds
/
library
/
SimplePie
/
Cache
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
03/17/2019 06:24:57 AM
rwxrwxr-x
📄
03036edfece701eaa1537fea4014dd44.spc
52.22 KB
02/11/2020 10:50:52 AM
rwxrwxrwx
📄
04d0c6cc2bf146b1318b78f84416b912.spc
123.26 KB
03/12/2020 06:21:28 AM
rw-r--r--
📄
0582678c8cfff117f770f9368b70c2b5.spc
19.97 KB
02/11/2020 10:50:53 AM
rwxrwxrwx
📄
06d19ca88661ebf5f2459dd4315a2bb1.spc
169 bytes
02/11/2020 10:50:53 AM
rwxrwxrwx
📄
09c20f5ef1098fa6a0dcbf757db22c44.spc
212.6 KB
03/07/2020 03:53:26 AM
rw-r--r--
📄
0bb533998a40e1ca3cefc59d6e542fc8.spc
34.69 KB
02/11/2020 10:50:53 AM
rwxrwxrwx
📄
0ed254d4d9db6e3afe193b00bc6471bb.spc
31.22 KB
03/11/2020 01:28:56 PM
rw-r--r--
📄
1469d584e9747d132077c9df3cda6c97.spc
121.54 KB
03/12/2020 06:21:28 AM
rw-r--r--
📄
1608544648e39ada42071bed51f3b175.spc
192.61 KB
02/11/2020 10:50:54 AM
rwxrwxrwx
📄
1857fc578c17e6145bcf223d333aa48d.spc
79.19 KB
02/11/2020 10:50:54 AM
rwxrwxrwx
📄
192555ba2ac5f902a3e3f1c0e4aae46c.spc
176 bytes
02/11/2020 10:50:54 AM
rwxrwxrwx
📄
196f73e8cf4330017ab92ef17541ebea.spc
34.06 KB
02/11/2020 10:50:54 AM
rwxrwxrwx
📄
19d7e90c3867383bc4790ba57a9f0a5c.spc
39.17 KB
02/11/2020 10:50:54 AM
rwxrwxrwx
📄
19f3a21c36072f501f634db8e658bc9f.spc
17.31 KB
02/11/2020 10:50:54 AM
rwxrwxrwx
📄
1a2ad7ec8e9ae3e242926fdbb1c728ec.spc
34.11 KB
02/11/2020 10:50:55 AM
rwxrwxrwx
📄
1afdf65a8c3ff9f8db7a8f10b580c286.spc
41.69 KB
02/11/2020 10:50:55 AM
rwxrwxrwx
📄
1bb80174ec75e092e3e7dbd063def8b9.spc
29.45 KB
03/06/2020 06:31:05 AM
rw-r--r--
📄
1de9a562a6be22df63820a9463bcd78e.spc
168 bytes
02/11/2020 10:50:55 AM
rwxrwxrwx
📄
1e85d1a99d268e01b229ade5baf241c4.spc
40.19 KB
02/11/2020 10:50:55 AM
rwxrwxrwx
📄
23796aacf2848a8f58cd3ef3f69e38fc.spc
419.69 KB
02/11/2020 10:50:56 AM
rwxrwxrwx
📄
2408c179b723e6418904b92398f6b137.spc
83.21 KB
02/11/2020 10:50:57 AM
rwxrwxrwx
📄
242d3dabf79d13154fcc384ff8b2d25e.spc
138.23 KB
03/12/2020 06:21:24 AM
rw-r--r--
📄
24739622a680323db111e64a3e3c3305.spc
13.08 KB
03/11/2020 01:28:57 PM
rw-r--r--
📄
26ad3f3473af193dfc893e18704c9003.spc
5.83 KB
02/11/2020 10:50:58 AM
rwxrwxrwx
📄
2799184659106c88b5072a3e3f763a4d.spc
12.3 KB
02/11/2020 10:50:58 AM
rwxrwxrwx
📄
2abcd685295b4a261ad2e866188e5e11.spc
123.52 KB
03/12/2020 06:21:29 AM
rw-r--r--
📄
2d3ca8b6dffd0b708a87b587b3ae50cc.spc
48.87 KB
08/11/2020 06:13:30 AM
rw-r--r--
📄
30d0eeac4a6b2d98cdef50ef2edffa28.spc
38.41 KB
07/21/2020 08:32:16 AM
rwxrwxrwx
📄
30d5af6cd4c10ea02520bcaba31f3d1c.spc
474.22 KB
02/20/2020 06:35:59 AM
rw-r--r--
📄
3291222baa2e5dd4e0c4863cead17f0a.spc
366.46 KB
02/11/2020 10:51:02 AM
rwxrwxrwx
📄
346a1bcfe350fe2a1953cd7fbdc86186.spc
33.68 KB
02/11/2020 10:51:03 AM
rwxrwxrwx
📄
3691c57bc9ef4dc350ce3298a8291556.spc
34.69 KB
02/11/2020 10:51:02 AM
rwxrwxrwx
📄
38d3dc98ecc1c3d1c27452a54603959b.spc
30.38 KB
02/11/2020 10:51:02 AM
rwxrwxrwx
📄
3f7816c2aa3e261331a0214ae283daba.spc
36.88 KB
02/11/2020 10:51:03 AM
rwxrwxrwx
📄
3fabe39fe5de4def5db0b070e9d0c12e.spc
89.1 KB
02/11/2020 10:51:03 AM
rwxrwxrwx
📄
402e99fadf0b4cfb19572847e3765644.spc
31.17 KB
02/20/2020 06:35:54 AM
rw-r--r--
📄
403c286cb5177de3aee8ae96d600e668.spc
22.17 KB
02/11/2020 10:51:03 AM
rwxrwxrwx
📄
473e9ea85fa887bf730a58a3138e8427.spc
51.38 KB
02/11/2020 10:51:03 AM
rwxrwxrwx
📄
47481ffe1d8aa644664a3e0c5e57b911.spc
33.55 KB
02/11/2020 10:51:04 AM
rwxrwxrwx
📄
4b9b019425e46aa5699b25b164731ea6.spc
191 bytes
02/11/2020 10:51:04 AM
rwxrwxrwx
📄
4e8baeaef3679f9460ffdecddbb1f6a7.spc
38.47 KB
02/11/2020 10:51:04 AM
rwxrwxrwx
📄
4eb2ea2e7b4ee9f516345a8e766106ea.spc
41.31 KB
02/11/2020 10:51:04 AM
rwxrwxrwx
📄
4eb3be40ca0ee332f013def0ede20b51.spc
57.32 KB
02/11/2020 10:51:04 AM
rwxrwxrwx
📄
4eea197c2a9df7be5770ed85a45166af.spc
32.13 KB
02/11/2020 10:51:04 AM
rwxrwxrwx
📄
50df6b48e1a1b469b4fa9e86fc0c5018.spc
33.52 KB
02/11/2020 10:51:05 AM
rwxrwxrwx
📄
51447ae67b6d856982df0ea0496cf24b.spc
27.75 KB
02/11/2020 10:51:05 AM
rwxrwxrwx
📄
52598486d45e22d0c8e6d2cb26125d0e.spc
185 bytes
02/11/2020 10:51:05 AM
rwxrwxrwx
📄
52db6769e7a09162da92fb931530d490.spc
251 bytes
02/11/2020 10:51:05 AM
rwxrwxrwx
📄
557bca13c9bf58c561d365f34528cf99.spc
660.96 KB
02/11/2020 10:51:10 AM
rwxrwxrwx
📄
569a7c623553d15856943f80ff0d9ef0.spc
38.82 KB
02/11/2020 10:51:05 AM
rwxrwxrwx
📄
588359e68ff59d4ef53aaf3edb6a44cf.spc
5.91 KB
03/29/2020 11:25:33 AM
rw-r--r--
📄
593ed9fb92861195f982096e36a276a5.spc
78.73 KB
02/11/2020 10:51:08 AM
rwxrwxrwx
📄
59b7e8b10798f98d6ede55dc16d36abd.spc
286.35 KB
02/11/2020 10:51:10 AM
rwxrwxrwx
📄
5b48fed85f692b870a2e1c54eb110eea.spc
92.95 KB
02/27/2020 05:27:34 PM
rw-r--r--
📄
5b894986f9f55d997ed60e84c8fb60c7.spc
32.87 KB
02/11/2020 10:51:10 AM
rwxrwxrwx
📄
5c46aa1f7a9fbddb1de61f99e41c4c73.spc
27.51 KB
02/11/2020 10:51:10 AM
rwxrwxrwx
📄
5c541078070a50b4ef826d433fcade97.spc
203 bytes
02/27/2020 05:27:37 PM
rw-r--r--
📄
5c744a4198beb7326dcf101f961486b4.spc
56.9 KB
08/20/2020 06:22:11 AM
rw-r--r--
📄
5ef8b2cef4776b3e3f9f79092ce932ca.spc
123.2 KB
03/12/2020 06:21:29 AM
rw-r--r--
📄
60bc545cda9dafe75484b88be1dd4ae9.spc
62.66 KB
03/12/2020 06:21:27 AM
rw-r--r--
📄
60cdba7804abf8b71744dac57a1fd036.spc
37.57 KB
02/11/2020 10:51:12 AM
rwxrwxrwx
📄
6270f865db79068a5dedb78ba877e7a0.spc
32.31 KB
04/10/2020 11:49:32 AM
rw-r--r--
📄
64e0619d4a6fcecb77cd4fa41dd6658c.spc
43.69 KB
02/20/2020 07:08:27 AM
rw-r--r--
📄
66267a4d6dba7887fc7d4a1aa2da9b75.spc
124.15 KB
03/12/2020 06:21:28 AM
rw-r--r--
📄
6b370910388637897c5bc54c01bf6458.spc
39.47 KB
02/11/2020 10:51:12 AM
rwxrwxrwx
📄
6cedd2c7609f97e8201f50ac95407eb3.spc
373.91 KB
02/14/2020 05:05:41 AM
rw-r--r--
📄
6f3a7e432f89d87825c8f322156d359e.spc
105 KB
02/11/2020 10:51:14 AM
rwxrwxrwx
📄
6fb29d2636fbee8586653a44de845c14.spc
36.78 KB
02/11/2020 10:51:15 AM
rwxrwxrwx
📄
73bb6c1505db5ddb104f30c60b108890.spc
41.35 KB
02/11/2020 10:51:15 AM
rwxrwxrwx
📄
75223b5917c4f5312a6c6a8aecd9f9e6.spc
50.85 KB
02/11/2020 10:51:15 AM
rwxrwxrwx
📄
77ff73ee1cbbb4a6cb4bb52bbfd0543c.spc
94.22 KB
02/11/2020 10:51:15 AM
rwxrwxrwx
📄
7947ab9dba76b764cad321483ebe03c4.spc
26.63 KB
02/11/2020 10:51:16 AM
rwxrwxrwx
📄
7c2f1bde8d6c3ddb510b8089c44af91e.spc
43.81 KB
02/11/2020 10:51:16 AM
rwxrwxrwx
📄
7d1ab5c52f2c3ab33c409e73bedecc5e.spc
3.86 KB
02/11/2020 10:51:16 AM
rwxrwxrwx
📄
7f39e24ab9c263578364ff0fcde11837.spc
168.82 KB
02/11/2020 10:51:17 AM
rwxrwxrwx
📄
7fb89d7009fbbd9a5c1c2dcac2e055af.spc
2.12 MB
02/11/2020 10:51:32 AM
rwxrwxrwx
📄
80d5eace46cca553f0c7e7a631ed6703.spc
122.15 KB
03/12/2020 06:21:29 AM
rw-r--r--
📄
8464ad04f90f3f666985ad6a300191a2.spc
183.31 KB
02/11/2020 10:51:21 AM
rwxrwxrwx
📄
87bb9147a3420bb80136500148ef65dd.spc
373.91 KB
02/14/2020 05:06:32 AM
rw-r--r--
📄
89342927fe6500da4a2cd74e4c24cd84.spc
63.45 KB
02/11/2020 10:51:24 AM
rwxrwxrwx
📄
8bbfe139e67e5f738b9ffcb18a7c5b86.spc
92.25 KB
02/11/2020 10:51:26 AM
rwxrwxrwx
📄
8ddc5ee335658bf8ec6b8844cf85c93f.spc
38.21 KB
02/11/2020 10:51:26 AM
rwxrwxrwx
📄
8e912fe5f85715a1da6db5b96e9f1c91.spc
39.3 KB
02/11/2020 10:51:27 AM
rwxrwxrwx
📄
8edc68ba045edb463abe484c4485b3c1.spc
299 KB
02/11/2020 10:51:29 AM
rwxrwxrwx
📄
906b5d59de170e528244744b925a8af5.spc
32.01 KB
03/12/2020 06:21:25 AM
rw-r--r--
📄
925665a1ef421d5783a6690aaf7df881.spc
8.67 KB
02/11/2020 10:51:30 AM
rwxrwxrwx
📄
92c4233c5ea49b0f47ba9af6486e17f6.spc
30.9 KB
02/14/2020 10:55:56 AM
rw-r--r--
📄
93e4fd43857be9fead41ffa09315517f.spc
34.1 KB
02/11/2020 10:51:32 AM
rwxrwxrwx
📄
94b8ccc457e138e62b74ac96766909fe.spc
43.13 KB
02/11/2020 10:51:32 AM
rwxrwxrwx
📄
96c4f97f5353d399aeef3f49fcc0bd5a.spc
57.89 KB
02/11/2020 10:51:32 AM
rwxrwxrwx
📄
99e1eb580536f979670980ef56caa779.spc
87.52 KB
02/11/2020 10:51:33 AM
rwxrwxrwx
📄
9b4ca5bfc6880bed7985069758de6a4f.spc
38.89 KB
02/11/2020 10:51:33 AM
rwxrwxrwx
📄
Base.php
3.35 KB
02/11/2020 10:51:42 AM
rwxrwxrwx
📄
DB.php
4.6 KB
02/11/2020 10:51:53 AM
rwxrwxrwx
📄
File.php
4.19 KB
02/11/2020 10:52:02 AM
rwxrwxrwx
📄
Memcache.php
4.81 KB
02/11/2020 10:52:02 AM
rwxrwxrwx
📄
Memcached.php
5.27 KB
02/11/2020 10:52:02 AM
rwxrwxrwx
📄
MySQL.php
12.67 KB
02/11/2020 10:52:02 AM
rwxrwxrwx
📄
Redis.php
3.77 KB
02/11/2020 10:52:02 AM
rwxrwxrwx
📄
a3f94d98665e5d26445aa2956b13985d.spc
138.35 KB
03/29/2020 01:13:19 PM
rw-r--r--
📄
a40a776457ebfa5dcaef5c99f859250c.spc
126.09 KB
02/11/2020 10:51:33 AM
rwxrwxrwx
📄
a4a2ea47955d1ebd2b59a41a045b89ba.spc
86.78 KB
07/20/2020 05:27:37 AM
rwxrwxrwx
📄
a68acd2dce64f10ba3d23b96452cbd57.spc
53.71 KB
02/11/2020 10:51:34 AM
rwxrwxrwx
📄
a989cfbb4ebcd4ea5aede2f8d18f6b80.spc
114.06 KB
03/29/2020 01:13:18 PM
rw-r--r--
📄
aaf764fb46ef69a016d4d915512cedd4.spc
677.76 KB
02/11/2020 10:51:41 AM
rwxrwxrwx
📄
abea4df88cf62a5d9a03eb72a825b2f5.spc
23.09 KB
02/11/2020 10:51:36 AM
rwxrwxrwx
📄
abfe9571c106187db93288b1ea97357a.spc
28.61 KB
02/11/2020 10:51:36 AM
rwxrwxrwx
📄
ac468e6e3b78f7a8673a1be751be1226.spc
64.53 KB
02/11/2020 10:51:38 AM
rwxrwxrwx
📄
adb710891b75ea3e9d2379f0460c1d19.spc
65.91 KB
04/11/2020 06:44:20 AM
rw-r--r--
📄
adb7ca764a42bad01a0ccae2df09c2fa.spc
34.34 KB
03/29/2020 01:13:20 PM
rw-r--r--
📄
b1fc76c9199e2130438d81b6297c73fa.spc
124.12 KB
03/12/2020 06:21:29 AM
rw-r--r--
📄
b44b9e448df189cee8d7c7774273267b.spc
61.57 KB
08/22/2020 05:21:09 AM
rw-r--r--
📄
b5b9fb6ba1e724416126f7788d4bd8b7.spc
19.39 KB
02/11/2020 10:51:42 AM
rwxrwxrwx
📄
b95f1bb33446efbc7fa195b29ff261c6.spc
27.65 KB
02/11/2020 10:51:42 AM
rwxrwxrwx
📄
babee465717bca2404982e2751c61c53.spc
176 bytes
02/11/2020 10:51:42 AM
rwxrwxrwx
📄
bd3c5c1472767419fe12061049343483.spc
122.93 KB
03/12/2020 06:21:29 AM
rw-r--r--
📄
beb279d0ed1b28135d1331bbeb778b85.spc
39.34 KB
03/12/2020 06:21:27 AM
rw-r--r--
📄
c033b35e93579cf666101f023d034851.spc
108.48 KB
02/20/2020 06:35:51 AM
rw-r--r--
📄
c168527cd70d44755d5e3dc302cff303.spc
71.23 KB
02/11/2020 10:51:44 AM
rwxrwxrwx
📄
c31156c2178130a5e98ebbb8b2f61319.spc
32.33 KB
03/12/2020 06:21:25 AM
rw-r--r--
📄
c36e33d44db45f66ded3082899946005.spc
38.34 KB
02/11/2020 10:51:45 AM
rwxrwxrwx
📄
c3ae4c4faa1570ab007529b2461aed7c.spc
70.81 KB
02/11/2020 10:51:46 AM
rwxrwxrwx
📄
c49105af5fef08449f157af0549bf58b.spc
22.82 KB
03/12/2020 06:21:26 AM
rw-r--r--
📄
c62b9f08975a3ce69acf5001c1be6fc0.spc
828.2 KB
02/11/2020 10:51:51 AM
rwxrwxrwx
📄
c70815c1694d1b436d240d9290d75605.spc
139.88 KB
02/27/2020 05:27:37 PM
rw-r--r--
📄
c96754afef1f81a69a0494827bfa975c.spc
61.67 KB
02/11/2020 10:52:51 AM
rw-r--r--
📄
c97a7600c7331a10d8231324118b3a67.spc
19.75 KB
02/11/2020 10:51:48 AM
rwxrwxrwx
📄
cc6545fb14fe412555c86b6880afe2fb.spc
192 bytes
07/19/2020 12:01:09 PM
rwxrwxrwx
📄
cdb828b9de2723669f8b1a1352709ee2.spc
387.08 KB
02/27/2020 05:27:35 PM
rw-r--r--
📄
cfba70f3409c5425ded2d8430338d49a.spc
52.97 KB
02/11/2020 10:51:52 AM
rwxrwxrwx
📄
d537e9e237a12ec958fea41eced57151.spc
186 bytes
02/11/2020 10:51:52 AM
rwxrwxrwx
📄
d7881a7f1d63da45f197c9a2e16999e4.spc
16.18 KB
02/11/2020 10:51:52 AM
rwxrwxrwx
📄
d8c5aac1146a5e6b3c91488029d275be.spc
27.99 KB
02/11/2020 10:51:52 AM
rwxrwxrwx
📄
d8eefb559112e58cb4dab21367a186e2.spc
228.32 KB
02/11/2020 10:51:53 AM
rwxrwxrwx
📄
d9db250644ba2877f115f509ace5a7b5.spc
28.08 KB
02/11/2020 10:51:53 AM
rwxrwxrwx
📄
dc319385e4015b85de4c0dee8d535f8f.spc
37.1 KB
02/11/2020 10:51:53 AM
rwxrwxrwx
📄
dc7b0425002a35c26a812e42646cc5af.spc
111 KB
03/12/2020 06:21:28 AM
rw-r--r--
📄
debf9c17532a02a6e6db578a7f3a4646.spc
142.69 KB
02/11/2020 10:51:54 AM
rwxrwxrwx
📄
defbb59ea45d623ea1c51ac8743c90ea.spc
165 bytes
02/11/2020 10:51:54 AM
rwxrwxrwx
📄
df45183a85d0f0324d9f35c8c667f311.spc
124.89 KB
03/12/2020 06:21:28 AM
rw-r--r--
📄
e095b95df0ddae888ac7f451f20129bc.spc
38.71 KB
07/21/2020 08:32:17 AM
rwxrwxrwx
📄
e2003b6fa97074e2942822467b17062e.spc
26.48 KB
02/11/2020 10:51:55 AM
rwxrwxrwx
📄
e2a37cd95187c01162d6f71089afe300.spc
50.54 KB
02/11/2020 10:51:55 AM
rwxrwxrwx
📄
e57f0a350e6688a01a91dda64cfa2101.spc
122.43 KB
02/11/2020 10:51:55 AM
rwxrwxrwx
📄
e5dae6ccace4ca4cc8216461dda29c74.spc
100.76 KB
02/11/2020 10:51:56 AM
rwxrwxrwx
📄
e76dbae7c8f284493808fa5931a959ea.spc
37.61 KB
02/11/2020 10:51:56 AM
rwxrwxrwx
📄
ea703f3e5c39f76615e5a8b975f794a2.spc
19.19 KB
02/11/2020 10:51:56 AM
rwxrwxrwx
📄
ea82db2f68568b4765fcf688d6c93116.spc
64.03 KB
02/11/2020 10:51:56 AM
rwxrwxrwx
📄
ead3210aad70aa054d53594c794ef5cb.spc
36.52 KB
02/11/2020 10:51:56 AM
rwxrwxrwx
📄
f104494ec9505a88f21eecf9104e7bd5.spc
43.49 KB
02/11/2020 10:51:57 AM
rwxrwxrwx
📄
f14af3dc82bb30bf0c3018917fa3a45a.spc
23.14 KB
02/11/2020 10:51:57 AM
rwxrwxrwx
📄
f2e6e96f252853f6483f6c9c725f0ee2.spc
78.09 KB
02/11/2020 10:51:57 AM
rwxrwxrwx
📄
f34923678798ad8b6c06d24190cb88cd.spc
329.67 KB
02/11/2020 10:51:59 AM
rwxrwxrwx
📄
f5306b0dbdad73410aada80dbc3392d4.spc
2.43 KB
02/11/2020 10:51:59 AM
rwxrwxrwx
📄
f74498a86970a084e5ca639447042aa3.spc
85.09 KB
02/11/2020 10:52:00 AM
rwxrwxrwx
📄
f7d657440800849c7fcaeb682984c7e6.spc
30.41 KB
03/24/2020 05:47:43 AM
rw-r--r--
📄
f9cf779dc17343f7a142ab34fefeb6eb.spc
428.03 KB
07/14/2020 10:43:54 AM
rwxrwxrwx
📄
fbc57cfd03bf1e4ef525660536f2fc4c.spc
18.92 KB
02/11/2020 10:52:01 AM
rwxrwxrwx
📄
fbe8c695ab40ed6d8e54c74cfd8720fe.spc
38.5 KB
02/11/2020 10:52:01 AM
rwxrwxrwx
📄
fcf7bfc598a8e90673a28eed5eb8247c.spc
67.72 KB
03/29/2020 11:29:51 AM
rw-r--r--
📄
fd653df8381ec085d867b89d482aed73.spc
63.39 KB
03/12/2020 06:21:26 AM
rw-r--r--
📄
fe2860db6cccfc29356a9613564f0ce6.spc
37.76 KB
02/11/2020 10:52:01 AM
rwxrwxrwx
📄
fe3f8e2b11a2d63598dad10b4d4a31f6.spc
18.73 KB
02/11/2020 10:52:01 AM
rwxrwxrwx
Editing: 2408c179b723e6418904b92398f6b137.spc
Close
a:4:{s:5:"child";a:1:{s:0:"";a:1:{s:3:"rss";a:1:{i:0;a:6:{s:4:"data";s:4:" ";s:7:"attribs";a:1:{s:0:"";a:1:{s:7:"version";s:3:"2.0";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:1:{s:0:"";a:1:{s:7:"channel";a:1:{i:0;a:6:{s:4:"data";s:111:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:27:"http://www.w3.org/2005/Atom";a:1:{s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:0:"";s:7:"attribs";a:1:{s:0:"";a:2:{s:3:"rel";s:4:"self";s:4:"href";s:56:"http://www.technewsworld.com/perl/syndication/rssfull.pl";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:0:"";a:9:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:13:"TechNewsWorld";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:9:"copyright";a:1:{i:0;a:5:{s:4:"data";s:14:"Copyright 2017";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:28:"http://www.technewsworld.com";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"language";a:1:{i:0;a:5:{s:4:"data";s:5:"en-us";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:41:"TechNewsWorld -- "All Tech, All the Time"";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:13:"lastBuildDate";a:1:{i:0;a:5:{s:4:"data";s:31:"Mon, 03 Apr 2017 05:24:13 -0700";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"pubDate";a:1:{i:0;a:5:{s:4:"data";s:31:"Mon, 03 Apr 2017 05:24:13 -0700";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:5:"image";a:1:{i:0;a:6:{s:4:"data";s:11:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:1:{s:0:"";a:3:{s:3:"url";a:1:{i:0;a:5:{s:4:"data";s:60:" http://www.technewsworld.com/images/rss/tnw_100x36.jpg ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:28:"http://www.technewsworld.com";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:13:"TechNewsWorld";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}}s:4:"item";a:26:{i:0;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:62:"Prank Responsibly: April Fools' Gags That Missed the Mark";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84426";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84426.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:399:"The Internet is a minefield on April 1, with tech companies getting in on the April Fools' act in weird, wonderful and often woeful ways. The line between a successful prank and one that leaves users sighing, or worse, is micron-thin, and the boost to one's reputation -- or knock on it -- can hang around for some time. This year, we've rounded up some of the Internet's worst April Fools' pranks.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:9:"Kris Holt";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-04-01T10:40:00-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:8:"Internet";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-04-01T10:40:00-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-04-01T11:28:20-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:731:" <a href="http://www.technewsworld.com/story/84426.html?rss=1"><img src="http://www.technewsworld.com/images/rw719818/joke" align="left" alt="" hspace="7" border="0" /></a> The Internet is a minefield on April 1, with tech companies getting in on the April Fools' act in weird, wonderful and often woeful ways. The line between a successful prank and one that leaves users sighing, or worse, is micron-thin, and the boost to one's reputation -- or knock on it -- can hang around for some time. This year, we've rounded up some of the worst April Fools' pranks unleashed on a tech-savvy audience in recent memory. Last year, Google added a new button to Gmail that could append an animated GIF to an outgoing message. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:1;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:69:"EquiSeq CEO Lexi Palmer: Act Like You're Not Scared and Go at It";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84411";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84411.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:394:"Lexi Palmer is CEO of EquiSeq, a biotech firm that does genetic testing of horses. Palmer met the company's founder, genetic researcher Paul Szauter, in 2015. "I was just finishing up my degree in interpersonal communications ... and he told me about the company he'd started," Palmer recalled. "I told him I knew everything about horses and said I could learn everything he did and market it."";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:13:"Vivian Wagner";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-31T10:23:05-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:10:"Exclusives";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-31T10:23:05-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-31T10:23:14-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:723:" <a href="http://www.technewsworld.com/story/84411.html?rss=1"><img src="http://www.technewsworld.com/images/rw888117/biotech" align="left" alt="" hspace="7" border="0" /></a> Lexi Palmer is CEO of EquiSeq, a biotech firm that does genetic testing of horses. Palmer was brought on as CEO by the company's founder, genetic researcher Paul Szauter, in 2015. "I was just finishing up my degree in interpersonal communications, and he told me about the company he'd started," Palmer recalled. "I told him I knew everything about horses and said I could learn everything he did and market it. Two weeks later we were discussing my title. He asked, "Where do you see yourself? What title do you want?" I said "CEO." ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:2;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:45:"Online Freedom of Speech May Be in Peril: Pew";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84423";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84423.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:363:"Trolling, cyberbullying, harassment and just plain nastiness have become commonplace online, and this situation is likely to remain unchanged or worsen over the next decade, suggests a Pew Research report released Wednesday. Researchers polled more than 1,500 technology experts, academics, and business and government leaders on the future of free speech online.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:16:"Richard Adhikari";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-30T14:43:45-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:8:"Internet";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-30T14:43:45-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-31T06:01:58-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:721:" <a href="http://www.technewsworld.com/story/84423.html?rss=1"><img src="http://www.technewsworld.com/images/rw719708/Internet-free-speech" align="left" alt="" hspace="7" border="0" /></a> Trolling, cyberbullying, harassment and just plain nastiness have become commonplace online, and this situation is likely to remain unchanged or worsen over the next decade, suggests a report the Pew Research Center released Wednesday. Pew and Elon University last summer polled more than 1,500 technology experts, academics, and business and government leaders on the future of free speech online. Forty-two percent of the survey respondents expected future online interactions to be about the same as they are today. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:3;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:43:"Zephyr Linux: Zippy Performance, Zero Decor";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84421";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84421.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:392:"Zephyr Linux is a newcomer to the Linux scene, and it is still morphing from developmental releases. However, it takes an interesting approach to removing desktop clutter and default software bloat. Zephyr is a collaboration between Leonard Ashley and other developers. Ashley built this distro on Devuan, a fork of Debian, and with it he gives the concept of minimalist design a fresh twist.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:15:"Jack M. Germain";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-30T16:24:47-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:7:"Reviews";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-30T16:24:47-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-31T12:13:02-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:736:" <a href="http://www.technewsworld.com/story/84421.html?rss=1"><img src="http://www.technewsworld.com/images/rw367601/linux-lightweight" align="left" alt="" hspace="7" border="0" /></a> Zephyr Linux, a newcomer to the Linux scene, is still morphing from developmental releases. However, it takes an interesting approach to removing desktop clutter and default software bloat. Zephyr is a collaboration between Leonard Ashley and other developers. Ashley built this distro on Devuan, a fork of Debian, and with it he gives the concept of minimalist design a fresh twist. Zephyr Linux is stripped down so you can remake it your way. Version 1.0 beta 2 stable is available in a separate ISO file for Fluxbox, JWN and Openbox. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:4;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:55:"Galaxy S8, S8+ Dazzle in Samsung's Comeback Launch";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84416";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84416.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:426:"Samsung on Wednesday launched the Galaxy S8 and S8+, its next generation of smartphones. They feature major improvements in design and security processing power, as well as new digital assistant technology that may challenge the best devices on the market. The Galaxy S8 and S8+ are available with 5.8 inch and 6.2 inch screens respectively. Both sport an infinity display using Corning Gorilla Glass, and a bezel-less design.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"David Jones";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-29T14:38:20-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:11:"Smartphones";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-29T14:38:20-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-29T14:38:24-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:713:" <a href="http://www.technewsworld.com/story/84416.html?rss=1"><img src="http://www.technewsworld.com/images/rw288427/samsung-s8" align="left" alt="" hspace="7" border="0" /></a> Samsung on Wednesday launched the Galaxy S8 and S8+, its next generation of smartphones. They feature major improvements in design and security processing power, as well as new digital assistant technology that may challenge the best devices on the market. The Galaxy S8 and S8+ are available with 5.8 inch and 6.2 inch screens respectively. Both sport an infinity display using Corning Gorilla Glass, and a bezel-less design that provides a wider viewing area and more immersive experience than traditional smartphones. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:5;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:44:"Cloud Foundry Aims to Close Cloud Skills Gap";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84419";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84419.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:393:"The Cloud Foundry Foundation has announced the launch of a worldwide cloud-native developer certification initiative. The foundation created the program to fill the widening gap of trained programmers for cloud apps and services. The Linux Foundation -- which has trained and certified more developers on open source software than any organization in the world -- will provide the instruction.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:15:"Jack M. Germain";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-29T15:25:46-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:10:"Developers";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-29T15:25:46-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-29T22:04:20-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:745:" <a href="http://www.technewsworld.com/story/84419.html?rss=1"><img src="http://www.technewsworld.com/images/rw448688/cloud-foundry" align="left" alt="" hspace="7" border="0" /></a> The Cloud Foundry Foundation has announced the launch of a worldwide cloud-native developer certification initiative. The foundation created the program to fill the widening gap of trained programmers for cloud apps and services. The Linux Foundation -- which has trained and certified more developers on open source software than any organization in the world -- will provide the instruction. More than a dozen leading technology, education and systems integration organizations around the world will participate in the cloud certification program. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:6;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:45:"Elon Musk Plans to Build a Human-AI Interface";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84415";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84415.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:397:"Tech visionary Elon Musk has launched a startup, Neuralink, dedicated to developing technology that will connect human brains directly to a computer. This venture is in its very early stages, Musk confirmed. Neuralink, which Musk is funding privately, is a medical research firm that aims to develop "neural lace" -- a technology that could allow the implanting of small electrodes into the brain.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"Peter Suciu";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-29T05:00:00-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:13:"Emerging Tech";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-29T05:00:00-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-29T12:50:37-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:721:" <a href="http://www.technewsworld.com/story/84415.html?rss=1"><img src="http://www.technewsworld.com/images/rw186077/elon-musk" align="left" alt="" hspace="7" border="0" /></a> Tech visionary Elon Musk, who currently helms both Tesla and SpaceX, has launched a startup, Neuralink, dedicated to developing technology that will connect human brains directly to a computer. This venture is in its very early stages, Musk confirmed. Neuralink, which Musk is funding privately, is a medical research firm that aims to develop "neural lace" -- a technology that could allow the implanting of small electrodes into the brain. Musk reportedly has recruited leading academics in the field to work with the company. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:7;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:22:"Too Much Communication";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84410";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84410.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:356:"The world is a smaller place because we have so many ways to connect and communicate, but it has created a generation gap, a gap of classes and perhaps even a culture gap. This may seem like a serious contradiction; after all shouldn't more means of communication bring us closer together? The obvious answer is yes, but unfortunately this is not the case.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"Peter Suciu";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-28T09:39:32-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:11:"Mobile Apps";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-28T09:39:32-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-28T13:55:10-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:689:" <a href="http://www.technewsworld.com/story/84410.html?rss=1"><img src="http://www.technewsworld.com/images/rw85974/communications" align="left" alt="" hspace="7" border="0" /></a> The world is a smaller place because we have so many ways to connect and communicate, but it has created a generation gap, a gap of classes and perhaps even a culture gap. This may seem like a serious contradiction; after all shouldn't more means of communication bring us closer together? The obvious answer is yes, but unfortunately this is not the case -- in part because so many technology start-ups have tried to create the next way to connect with friends, colleagues and acquaintances. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:8;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:57:"Red Hat Pilots New Program to Ease Digital Transformation";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84412";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84412.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:364:"Red Hat on Monday announced a new Application Platform Partner Initiative at its North America Partner Conference in Las Vegas. The goal is to provide a more robust ecosystem for companies engaging in digital transformation. The company has started conducting tests in a pilot program with a small number of solutions-oriented consulting partners in North America.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"David Jones";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-28T12:23:46-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:10:"Enterprise";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-28T12:23:46-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-28T21:12:35-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:734:" <a href="http://www.technewsworld.com/story/84412.html?rss=1"><img src="http://www.technewsworld.com/images/rw465314/red-hat" align="left" alt="" hspace="7" border="0" /></a> Red Hat on Monday announced a new Application Platform Partner Initiative at its North America Partner Conference in Las Vegas. The goal is to provide a more robust ecosystem for companies engaging in digital transformation. The company has started conducting tests in a pilot program with a small number of solutions-oriented consulting partners in North America. "We are planning to engage with a small group of partners during the pilot phase -- aiming for approximately one to two dozen partners," said Red Hat spokesperson Daniel Thompson. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:9;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:71:"UK Home Secretary: Apps Shouldn't Serve as Terrorist Hiding Places";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84409";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84409.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:351:"UK Home Secretary Amber Rudd on Sunday called for greater government access to encrypted content on mobile apps. Apps with end-to-end encryption, like Facebook's WhatsApp, should not be allowed to conceal terrorists' communications from law enforcement, Rudd said in a television interview. "There should be no place for terrorists to hide," she said.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:17:"John P. Mello Jr.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-27T15:44:59-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:11:"Mobile Apps";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-27T15:44:59-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-28T00:18:55-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:724:" <a href="http://www.technewsworld.com/story/84409.html?rss=1"><img src="http://www.technewsworld.com/images/rw286353/encryption" align="left" alt="" hspace="7" border="0" /></a> UK Home Secretary Amber Rudd on Sunday called for greater government access to encrypted content on mobile apps. Apps with end-to-end encryption, like Facebook's WhatsApp, should not be allowed to conceal terrorists' communications from law enforcement, Rudd said in a television interview. "There should be no place for terrorists to hide," she said. "We need to make sure that organizations like WhatsApp -- and there are plenty of others like that -- don't provide a secret place for terrorists to communicate with each other." ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:10;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:69:"Don't Let the Next Catastrophic Phishing Scandal End Your Career";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84402";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84402.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:398:"What I think is amazing about all of the massive data breaches we hear about is that we know most are not reported. For every email, customer record, or financial theft in the news, there likely are hundreds that remain in the shadows. Yet another incident came to light last week. A clever Lithuanian individual was able to pull a whopping $100 million from a bunch of unnamed Internet companies.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"Rob Enderle";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-27T10:33:06-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:9:"Tech Buzz";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-27T10:33:06-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-29T06:20:28-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:726:" <a href="http://www.technewsworld.com/story/84402.html?rss=1"><img src="http://www.technewsworld.com/images/rw910670/phishing" align="left" alt="" hspace="7" border="0" /></a> What I think is amazing about all of the massive data breaches we hear about is that we know most are not reported. In other words, for every email, customer record, or financial theft in the news, there likely are hundreds that remain in the shadows. This problem is huge and yet another incident came to light last week. A clever Lithuanian individual was able to pull a whopping $100 million from a bunch of unnamed Internet companies using a combination of phishing tactics and fake vendors spread across a multitude of companies. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:11;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:53:"Group Demands Apple Pay Ransom for iCloud Credentials";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84406";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84406.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:399:"Apple has received a ransom threat from a hacking group claiming to have access to data for up to 800 million iCloud accounts. The hackers, said to be a group called the "Turkish Crime Family," have threatened to reset passwords and remotely wipe the iPhones of millions of iCloud users if Apple fails to hand over a total of $700,000. They have given the company an ultimatum to respond by April 7.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"David Jones";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-24T15:47:34-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:7:"Hacking";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-24T15:47:34-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-25T09:01:14-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:684:" <a href="http://www.technewsworld.com/story/84406.html?rss=1"><img src="http://www.technewsworld.com/images/rw586464/apple-ransom" align="left" alt="" hspace="7" border="0" /></a> Apple has received a ransom threat from a hacking group claiming to have access to data for up to 800 million iCloud accounts. The hackers, said to be a London-based group called the "Turkish Crime Family," have threatened to reset passwords and remotely wipe the iPhones of millions of iCloud users if Apple fails to hand over a total of $700,000. They have given the company an ultimatum to respond by April 7. Apple reportedly has denied that the group succeeded in hacking its systems. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:12;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:55:"WikiLeaks Exposes CIA's Device Surveillance Tricks";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84401";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84401.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:392:"WikiLeaks has released more Vault 7 documentation online, including details about several CIA projects to infect Apple's Mac computer firmware and operating system. The site unloaded its first batch of stolen Vault 7 data earlier this month. The CIA's Embedded Development Branch developed malware that could persist even if the targeted computer were reformatted and its OS were reinstalled.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"Peter Suciu";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-23T12:59:29-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:13:"Cybersecurity";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-23T12:59:29-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-23T15:38:03-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:726:" <a href="http://www.technewsworld.com/story/84401.html?rss=1"><img src="http://www.technewsworld.com/images/rw757761/data-leak" align="left" alt="" hspace="7" border="0" /></a> WikiLeaks has released more Vault 7 documentation online, including details about several CIA projects to infect Apple's Mac computer firmware and operating system. The site unloaded its first batch of stolen Vault 7 data earlier this month. The CIA's Embedded Development Branch developed malware that could persist even if the targeted computer were reformatted and its OS were reinstalled, according to data WikiLeaks exposed. The newly released files shone a spotlight on the CIA's efforts to gain "persistence" in Apple devices. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:13;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:36:"OpenSuse Leap Reinforces Linux Faith";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84399";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84399.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:374:"OpenSuse Leap 42.2 goes a long way toward maintaining Suse's reputation for reliability and stability. That said, new users might need a push to take the leap from their familiar distros to this latest OpenSuse release. Business users can remain confident that upgrading to the latest edition, released last fall, won't put them too close to the bleeding edge of innovation.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:15:"Jack M. Germain";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-23T14:09:17-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:7:"Reviews";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-23T14:09:17-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-24T07:02:20-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:723:" <a href="http://www.technewsworld.com/story/84399.html?rss=1"><img src="http://www.technewsworld.com/images/rw545870/open-suse" align="left" alt="" hspace="7" border="0" /></a> OpenSuse Leap 42.2 goes a long way toward maintaining Suse's reputation for reliability and stability. That said, new users might need a push to take the leap from their familiar distros to this latest OpenSuse release. Business users can remain confident that upgrading to the latest edition won't put them too close to the bleeding edge of innovation. There is little cause for worry that upgrading might break their current applications and configurations. Leap 42.2 is a safe way to avoid the pitfalls of upgrading too quickly. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:14;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:57:"Apple Unveils Budget-Friendly iPad, Dresses iPhone in Red";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84395";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84395.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:396:"Apple has announced an iPad update, a red iPhone 7 and 7 Plus, and a new video-editing app for iOS. The iPad upgrade has a 9.7-inch, 2048 x 1536-pixel Retina display and Apple's A9 64-bit processor. The unit will come in silver, gold and space gray with a starting price of $329 for 32 gigabytes of storage and WiFi-only support. It will cost $459 for a 32-GB unit with WiFi and cellular support.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:17:"John P. Mello Jr.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-22T10:44:20-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:7:"Tablets";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-22T10:44:20-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-22T23:21:50-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:732:" <a href="http://www.technewsworld.com/story/84395.html?rss=1"><img src="http://www.technewsworld.com/images/rw463330/ipad" align="left" alt="" hspace="7" border="0" /></a> Apple has announced an iPad update, a red iPhone 7 and 7 Plus, and a new video-editing app for iOS. The iPad upgrade has a 9.7-inch, 2048 x 1536-pixel Retina display and Apple's A9 64-bit processor. The unit will come in silver, gold and space gray with a starting price of $329 for 32 gigabytes of storage and WiFi-only support. It will cost $459 for a 32-GB unit with WiFi and cellular support. As with prior models, the battery life for the new iPad is 10 hours. It has an 8-megapixel rear-facing camera and 1.2-MP front-facing FaceTime unit. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:15;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:41:"Google Gives Devs First Look at Android O";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84396";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84396.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:386:"Google on Tuesday unveiled a developer preview of the latest version of its mobile operating system, code named "Android O." The new OS is designed to improve on battery life and interactive performance of devices, according to Dave Burke, vice president of engineering, Android, at Google. The new release puts automatic limits on what applications do in the background in three areas.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"David Jones";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-22T16:35:29-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:6:"Mobile";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-22T16:35:29-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-25T12:28:56-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:712:" <a href="http://www.technewsworld.com/story/84396.html?rss=1"><img src="http://www.technewsworld.com/images/rw725820/android" align="left" alt="" hspace="7" border="0" /></a> Google on Tuesday unveiled a developer preview of the latest version of its mobile operating system, code named "Android O." The new OS is designed to improve on battery life and interactive performance of devices, according to Dave Burke, vice president of engineering, Android, at Google. The new release puts automatic limits on what applications do in the background in three areas: implicit broadcasts, background services and location updates. Updated developer previews will become available in the coming months. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:16;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:34:"Apple May Alter the AR Competition";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84391";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84391.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:383:"Apple is stockpiling resources to make a splash in the augmented reality market. The company reportedly is not only marshaling internal resources behind its AR efforts, but also hiring talented outsiders and acquiring companies with expertise in AR hardware, 3D gaming and virtual reality software. The new outsiders include engineers who worked VR headsets for Google and Microsoft.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:17:"John P. Mello Jr.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-21T10:35:44-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:9:"Tech Buzz";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-21T10:35:44-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-21T11:36:02-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:730:" <a href="http://www.technewsworld.com/story/84391.html?rss=1"><img src="http://www.technewsworld.com/images/rw940319/augmented-reality" align="left" alt="" hspace="7" border="0" /></a> Apple is stockpiling resources to make a splash in the augmented reality market. The company reportedly is not only marshaling internal resources behind its AR efforts, but also hiring talented outsiders and acquiring companies with expertise in AR hardware, 3D gaming and virtual reality software. The new outsiders include a former Dolby labs executive, and engineers who worked virtual reality headsets for Google and Microsoft. "We've been waiting for Apple to launch something in AR," said Strategy Analytics' David MacQueen. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:17;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:18:"Cracking the Shell";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84393";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84393.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:388:"If you've begun to tinker with your desktop Linux terminal, you may be ready to take a deeper dive. You're no longer put off by references to "terminal," "command line" or "shell," and you have a grasp of how files are organized. You can distinguish between a command, an option and an argument. You've begun navigating your system. Now what? File manipulation lies at the heart of Linux.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:16:"Jonathan Terrasi";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-21T15:22:13-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:9:"Tech Blog";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-21T15:22:13-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-22T03:25:27-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:744:" <a href="http://www.technewsworld.com/story/84393.html?rss=1"><img src="http://www.technewsworld.com/images/rw426302/linux-desktop-terminal" align="left" alt="" hspace="7" border="0" /></a> If you've begun to tinker with your desktop Linux terminal, you may be ready to take a deeper dive. You're no longer put off by references to "terminal," "command line" or "shell," and you have a grasp of how files are organized. You can distinguish between a command, an option and an argument. You've begun navigating your system. Now what? File manipulation -- that is, allowing users to traverse the directory structure and interact with its contents -- lies at the heart of Linux. There is a sizable arsenal of tools at your disposal. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:18;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:51:"Why Tech Can't Help Donald Trump and Most CEOs";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84388";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84388.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:398:"The new president is making almost the identical mistake President Obama made during his first two years. Trump has picked a major entitlement to hang his hat on -- the same major entitlement, healthcare -- and shortly will discover what most CIOs know: You don't mess with anything that touches everybody. The likely outcome will be that like Obama, Trump will lose the house in the next election.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"Rob Enderle";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-20T10:15:38-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:9:"Tech Buzz";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-20T10:15:38-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-20T22:09:38-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:713:" <a href="http://www.technewsworld.com/story/84388.html?rss=1"><img src="http://www.technewsworld.com/images/rw914800/ceos" align="left" alt="" hspace="7" border="0" /></a> The new president is making almost the identical mistake President Obama made during his first two years. Trump has picked a major entitlement to hang his hat on -- the same major entitlement, healthcare -- and shortly will discover what most CIOs know: You don't mess with anything that touches everybody. The likely outcome will be that like Obama, Trump will lose the house in the next election, and that the Republicans will be forced out of power over the next four to eight years, all for an avoidable, repeated mistake. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:19;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:56:"IBM Launches Enterprise-Strength Blockchain as a Service";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84390";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84390.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:394:"IBM has unveiled the first enterprise-ready Blockchain as a Service offering based on The Linux Foundation's open source Hyperledger Fabric. IBM Blockchain, which lets developers quickly establish highly secure blockchain networks on the IBM cloud, is a transformative step in being able to deploy high-speed, secure business transactions through the network on a large scale, the company said.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"David Jones";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-20T15:36:09-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:10:"Enterprise";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-20T15:36:09-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-21T05:49:34-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:734:" <a href="http://www.technewsworld.com/story/84390.html?rss=1"><img src="http://www.technewsworld.com/images/rw278838/blockchain" align="left" alt="" hspace="7" border="0" /></a> IBM on Monday unveiled the first enterprise-ready Blockchain as a Service offering based on The Linux Foundation's open source Hyperledger Fabric version 1.0. IBM Blockchain, which lets developers quickly establish highly secure blockchain networks on the IBM cloud, is a transformative step in being able to deploy high-speed, secure business transactions through the network on a large scale, the company said. The platform offers the world's safest Linux infrastructure, with tamper-responsive hardware security modules, according to IBM. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:20;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:63:"Crafty Phishing Technique Can Trick Even Tech-Savvy Gmail Users";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84386";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84386.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:380:"Gmail users recently have been targeted by a sophisticated series of phishing attacks that use emails from a known contact. The emails contain an image of an attachment that appears to be legitimate, according to Wordfence. The sophisticated attack displays "accounts.gmail.com" in the browser's location bar and leads users to what appears to be a legitimate Google sign-in page.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"David Jones";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-17T10:45:33-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:13:"Cybersecurity";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-17T10:45:33-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-17T11:26:58-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:689:" <a href="http://www.technewsworld.com/story/84386.html?rss=1"><img src="http://www.technewsworld.com/images/rw770101/phishing" align="left" alt="" hspace="7" border="0" /></a> Gmail users recently have been targeted by a sophisticated series of phishing attacks that use emails from a known contact whose account has been compromised. The emails contain an image of an attachment that appears to be legitimate, according to Wordfence. The sophisticated attack displays "accounts.gmail.com" in the browser's location bar and leads users to what appears to be a legitimate Google sign-in page where they are prompted to supply their credentials, which then become compromised. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:21;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:67:"Google Unveils Guetzli, Open Source JPEG Encoder, to Speed Browsing";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84384";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84384.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:337:"Google on Thursday announced Guetzli, a new contribution to its evolving set of tools for the open source community. Guetzli is an encoder that allows JPEG files to be compressed as much as 35 percent, resulting in much faster Web page loading. "Guetzli," which means "cookie" in Swiss German, allows users to create smaller JPEG images.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:11:"David Jones";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-18T10:38:13-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:8:"Software";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-18T10:38:13-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-18T15:05:36-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:744:" <a href="http://www.technewsworld.com/story/84384.html?rss=1"><img src="http://www.technewsworld.com/images/rw195255/web-page-loading" align="left" alt="" hspace="7" border="0" /></a> Google on Thursday announced Guetzli, a new contribution to its evolving set of tools for the open source community. Guetzli is an encoder that allows JPEG files to be compressed as much as 35 percent, resulting in much faster Web page loading. "Guetzli," which means "cookie" in Swiss German, allows users to create smaller JPEG images while maintaining compatibility with existing Web browsers, image processing applications and the existing JPEG standard, noted Robert Obryk and Jyrki Alakuijala, software engineers at Google Research Europe. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:22;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:49:"Pro-Turkey Hackers Hit Prominent Twitter Accounts";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84381";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84381.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:377:"Hundreds, if not thousands, of Twitter users, many of them high-profile, were hacked Tuesday by someone who appeared to support Turkey in its diplomatic row with the Netherlands. Their accounts displayed a Swastika -- reversed to face to the right -- as well as the Turkish flag and hashtags to the Nazialmanya and Nazihollanda accounts, which displayed comments on the attack.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:16:"Richard Adhikari";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-16T14:06:13-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:7:"Hacking";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-16T14:06:13-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-20T02:20:34-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:692:" <a href="http://www.technewsworld.com/story/84381.html?rss=1"><img src="http://www.technewsworld.com/images/rw222167/twitter" align="left" alt="" hspace="7" border="0" /></a> Hundreds, if not thousands, of Twitter users, many of them high-profile, were hacked Tuesday by someone who appeared to support Turkey in its diplomatic row with the Netherlands. Their accounts displayed a Swastika -- reversed to face to the right -- as well as the Turkish flag and hashtags to the Nazialmanya and Nazihollanda accounts, which displayed comments on the attack. The hackers included a reference to April 16, when Turkey will hold a referendum to give President Recep Erdogan more power. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:23;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:33:"Slackel Openbox Plays Hard to Get";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84380";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84380.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:375:"Slackel's Openbox edition is a lightweight operating system that offers reliable performance once you get the box open. It is not an ideal OS for every user, though. Slackel 6.0.8 Openbox was released by developer Dimitris Tzemos last fall. Slackel is a Linux distro that offers several benefits for users who step away from the typical mainstream Debian-based Linux distros.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:15:"Jack M. Germain";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-16T15:03:18-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:7:"Reviews";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-16T15:03:18-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-17T12:53:37-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:737:" <a href="http://www.technewsworld.com/story/84380.html?rss=1"><img src="http://www.technewsworld.com/images/rw878191/slackware" align="left" alt="" hspace="7" border="0" /></a> Slackel's Openbox edition is a lightweight operating system that offers reliable performance once you get the box open. It is not ideal for every user, though. Slackel 6.0.8 Openbox, the latest version of the project's lightweight distribution, was released by developer Dimitris Tzemos last fall. Slackel is a Linux distro that offers several benefits for users who step away from the typical mainstream Debian-based Linux distros. Based on both Slackware and Salix, it offers a few advantages not usually found with the Slackware Linux lineup. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:24;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:31:"Facebook Gets Tough on Spy Apps";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84375";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84375.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:365:"Facebook has updated its Facebook and Instagram policies to prohibit developers from using data obtained from those platforms in surveillance tools, according to Rob Sherman, deputy chief privacy officer. Facebook already has taken enforcement actions against devs who created and marketed surveillance tools in violation of the company's previous policy, he noted.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:17:"John P. Mello Jr.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-15T10:51:30-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:7:"Privacy";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-15T10:51:30-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-16T02:56:19-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:742:" <a href="http://www.technewsworld.com/story/84375.html?rss=1"><img src="http://www.technewsworld.com/images/rw690603/data-surveillance" align="left" alt="" hspace="7" border="0" /></a> Facebook has moved to prevent spy applications from accessing its users' data. The company has updated its Facebook and Instagram policies to prohibit developers from using data obtained from those platforms in surveillance tools, according to Rob Sherman, deputy chief privacy officer. Facebook already has taken enforcement actions against devs who created and marketed surveillance tools in violation of the company's previous policy, he noted, adding that "we want to be sure everyone understands the underlying policy and how to comply." ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}i:25;a:6:{s:4:"data";s:32:" ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";s:5:"child";a:4:{s:0:"";a:4:{s:5:"title";a:1:{i:0;a:5:{s:4:"data";s:47:"Accenture and Docker Team on Container Services";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"guid";a:1:{i:0;a:5:{s:4:"data";s:34:"http://www.technewsworld.com-84376";s:7:"attribs";a:1:{s:0:"";a:1:{s:11:"isPermaLink";s:5:"false";}}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"link";a:1:{i:0;a:5:{s:4:"data";s:51:"http://www.technewsworld.com/story/84376.html?rss=1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:11:"description";a:1:{i:0;a:5:{s:4:"data";s:372:"Accenture and Docker on Wednesday announced an expanded global alliance and the availability of container services within the Accenture Cloud Factory. The new services provide a faster industrialized on-ramp solution for enterprises moving to the cloud. They focus on container enablement of applications and feature use of Docker Datacenter Enterprise Edition - Standard.";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:3:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:15:"Jack M. Germain";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:4:"date";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-15T11:51:46-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:7:"subject";a:1:{i:0;a:5:{s:4:"data";s:10:"Enterprise";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:25:"http://purl.org/dc/terms/";a:2:{s:6:"issued";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-15T11:51:46-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:8:"modified";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-03-16T15:44:46-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:40:"http://purl.org/rss/1.0/modules/content/";a:1:{s:7:"encoded";a:1:{i:0;a:5:{s:4:"data";s:738:" <a href="http://www.technewsworld.com/story/84376.html?rss=1"><img src="http://www.technewsworld.com/images/rw433937/docker" align="left" alt="" hspace="7" border="0" /></a> Accenture and Docker on Wednesday announced an expanded global alliance and the availability of container services within the Accenture Cloud Factory. The new services provide a faster industrialized on-ramp solution for enterprises moving to the cloud. They focus on container enablement of applications and feature use of Docker Datacenter Enterprise Edition - Standard. Docker Datacenter is an integrated container management platform for development and IT operations that brings security, policy and controls to the software delivery lifecycle. ";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}}}s:44:"http://purl.org/rss/1.0/modules/syndication/";a:3:{s:12:"updatePeriod";a:1:{i:0;a:5:{s:4:"data";s:6:"hourly";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:10:"updateBase";a:1:{i:0;a:5:{s:4:"data";s:25:"2017-04-03T05:24:13-07:00";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:15:"updateFrequency";a:1:{i:0;a:5:{s:4:"data";s:1:"1";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}s:32:"http://purl.org/dc/elements/1.1/";a:2:{s:7:"creator";a:1:{i:0;a:5:{s:4:"data";s:16:"ECT News Network";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}s:9:"publisher";a:1:{i:0;a:5:{s:4:"data";s:16:"ECT News Network";s:7:"attribs";a:0:{}s:8:"xml_base";s:0:"";s:17:"xml_base_explicit";b:0;s:8:"xml_lang";s:0:"";}}}}}}}}}}}}s:4:"type";i:128;s:7:"headers";a:8:{s:6:"server";s:11:"nginx/1.8.0";s:4:"date";s:29:"Mon, 03 Apr 2017 12:24:13 GMT";s:12:"content-type";s:8:"text/xml";s:10:"connection";s:10:"keep-alive";s:11:"x-served-by";s:14:"ip-10-10-1-141";s:10:"set-cookie";s:83:"Apache=75.126.24.72.117071491222253839; path=/; expires=Tue, 03-Apr-18 12:24:13 GMT";s:3:"p3p";s:36:"CP=ALL DSP COR DEVa TAIa OUR IND DEM";s:16:"content-encoding";s:4:"gzip";}s:5:"build";s:14:"20170320111507";}