• Home
  • Web Security
  • Uncategorized
  • Vulnerabilities
  • Microsoft
  • ransomware
Log In
February 22, 2019

User Panel Banner
Log In

  • Home
  • Web Security
  • Uncategorized
  • Vulnerabilities
  • Microsoft
  • ransomware
HomeWeb SecurityBitTorrent To Refocus On What Made It Rich –...

BitTorrent To Refocus On What Made It Rich – uTorrent

  • March 28, 2017
  • 0 comments
  • Simon Steed
  • Posted in Web Security
  • 0
0
SHARES
ShareTweet

Best known for its uTorrent client, BitTorrent Inc has been focusing more on other projects for a while. But now, with another shake-up imminent, the company has made a fresh commitment to focus on uTorrent and Mainline clients. From an article on TorrentFreak: Caught between the bad publicity generated by millions of pirates using the software for less than legal activities, a reliance on its huge revenue, plus its role in distributing content from signed-up artists, BitTorrent Inc. has at times been required to delicately maneuver around the client’s very existence. Now, however, that might be about to change. According to a report from Variety, changes are underway at BitTorrent Inc that could see uTorrent and its Mainline sister client come back into the limelight. First up, the company has yet another new CEO. Rogelio Choy joins the company after spending two years at parking service Luxe Valet. However, Choy is also a former BitTorrent employee, serving as its Chief Operating Officer between 2012 and 2015. The hiring of Choy reportedly coincides with a shake-up of BitTorrent Inc.’s product line. BitTorrent Live, the patented live video streaming project developed by BitTorrent creator Bram Cohen, will be set loose as a separate, venture-funded company, Variety reports.


Share on Google+

Read more of this story at Slashdot.

https://slashdot.org/slashdot-it.pl?op=discuss&id=10421089&smallembed=1

Share this

ShareTweet

Related Posts

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

0 comments
UncategorizedWeb Security

GDPR: who needs to hire a data protection officer?

0 comments
DDoSPrivacyUncategorizedWeb Security

News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online

US Congress Votes To Shred ISP Privacy Rules

  • March 28, 2017
  • 0 comments

AT&T Joins The Linux Foundation as a Platinum...

  • March 28, 2017
  • 0 comments

Share this

0
SHARES
ShareTweet

About author

Simon Steed

Related Posts

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

0 comments
UncategorizedWeb Security

GDPR: who needs to hire a data protection officer?

0 comments
DDoSPrivacyUncategorizedWeb Security

News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online

0 comments
Web Security

Now Any Florida Resident Can Challenge What Is Taught In Public Florida Schools

Tags

  • IT
  • security
  • threats

Leave a Reply Cancel reply

Do not miss

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

Pages

  • A List Of Rules That Every C Programmer Should Follow
  • A tutorial on I/O Streams
  • A TUTORIAL ON POINTERS AND ARRAYS IN C
  • An Assembly Language Primer(C) 1983 by David Whitman
  • C Frequently Asked Questions (FAQ) Full Version
  • C/C++ Null Pointers
  • C++ Operators by John M. Dlugosz
  • C++ Overview by John Tal
  • comp.lang.c Answers to Frequently Asked Questions (FAQ List)
  • Delphi Tips
  • Delphi Tutorial – Lesson 1 12/29/98 Frank Fortino [email protected] Copyright 1999
  • Delphi Tutorial – Lesson 2 More Delphi Stuff 1/4/99 Frank Fortino [email protected] Copyright 1999
  • General Steps in Converting C applications to C++
  • Home
  • How to do things in Visual Basic
  • IBM Personal Computer Assembly Language Tutorial
  • LocalSQL.hlp as HTML File
  • Programming in C – a shortish tutorial by Toto
  • Sample Page
  • Using the Debug Command (dos)
  • Write simple scripts in PERL (CGI)

Top Posts

Health trust rapped on illegal use of patient data...

  • July 5, 2017
  • 0

GDPR: who needs to hire a data protection officer?

  • July 5, 2017
  • 0

News in brief: China tightens Great Firewall; stud...

  • July 5, 2017
  • 0

Now Any Florida Resident Can Challenge What Is Tau...

  • July 4, 2017
  • 0

Court Blocks EPA Effort To Suspend Obama-Era Metha...

  • July 4, 2017
  • 0

Tags

IT security threats

Archive

Site Categories

Copyright © 2006-2016 xploiter.com
Got a hot tip? Send it to us!

Your Name (required)

Your Email (required)

Video URL

Attach Video

Category
SportNewsTechMusic

Your Message

Got a hot tip? Send it to us!

Your Name (required)

Your Email (required)

Subject

Your Message