Ten years after Hurricane Katrina devastated the Gulf Coast, take the advice of these Louisiana IT leaders, who learned lessons the hard way about safeguarding infrastructure and equipment.
Stories by Tony Bradley
500,000. That's the number of takedown requests Microsoft has submitted to Google just over the past month related to copyright infringement and software piracy.
Cisco is pulling the plug on its Cius tablet. Despite the fact that the Cius never really went head to head with more consumer-centric tablets, the Cisco device is nevertheless the latest victim of the iPad's dominance.
AOL announced that it has closed a deal to sell more than 800 patents to Microsoft. The deal is just north of a billion dollars, and it's easy to see why AOL might want to cash in on the intellectual property. What is less clear is why Microsoft is interested in the patent portfolio, or what Microsoft gains from the deal.
Linux is awesome. It's a powerful, capable, flexible operating system with tremendous potential. But, it's never going to be a factor on the desktop, so don't even waste your time considering it.
Dell is committed to joining the tablet fray once again--this time with Windows 8 tablets aimed at going head-to-head with the Apple iPad.
I think the idea of the "post-PC era" needs some clarification. There is much hoopla and fanfare being dedicated to dwindling PC sales, and the idea that tablets - specifically the Apple iPad - are going to be the death knell for PCs. It's not a "death", it's an "evolution" and the tablet is just the new PC.
These new and improved features in Windows Server 8 will make many Windows administrators very happy.
There are reports of alleged pricing information being leaked for the upcoming Samsung Galaxy Tab 2. Assuming the information is accurate, Samsung has apparently not learned any lessons from its tablet experience thus far, or from the challenges and failures of its rivals.
Microsoft's final curtain at CES 2012 has come with some well-deserved attention for Windows Phone devices.
Smartphones and tablets are evolving from niche luxury devices to mainstream consumer gadgets. As mobile devices become a ubiquitous part of the mainstream culture, malware developers are paying attention and are anxious to exploit the fertile new territory.
The Amazon Kindle Fire is living up to its name by setting the tablet market on fire. Pre-orders of the as yet unreleased tablet have been phenomenal. The success of the Kindle Fire, however, puts Android tablets in general between a rock and a hard place.
A little birdie (The Verge) revealed earlier today that HP's new CEO Meg Whitman had scheduled an all-hands meeting for the WebOS crew. The news sparked speculation that HP had perhaps found a suitor for the mobile platform, but those predictions turned up false.
Today is Microsoft’s Patch Tuesday for the month of November--the eleventh Patch Tuesday of 2011. It is a light month from Microsoft, with only four security bulletins. The big news, though, is that a zero day flaw being exploited by the Duqu worm is not among the vulnerabilities fixed by Microsoft today.
Android is the leading smartphone platform with a diverse array of devices available from a variety of manufacturers, and from virtually every wireless carrier. As capable as the Android OS might be, though, its diversity is also one of its greatest handicaps.
- Solution Architect ACT
- Full Stack Developer - Angular NSW
- Senior IT Security Specialist-SANS, ISC2, ISACA, ITIL NSW
- TIBCO Integration Consultant VIC
- Oracle Fusion SOA/BPEL Developer VIC
- Linux Administrator VIC
- Security Clearances Vetting Services Officer ACT
- Senior Java Developer / Technical Lead ACT
- Network Engineer | Routing & switching | Design, implementation, L3 support NSW
- Graduate IT Support Officer NSW
- Hear from those who have been there, done it and transformed their business for the better with AWS Cloud. View their stories and other informative AWS sessions On-Demand.
- NEW Gigamon Transform Security Zone - Find out more now!
- APJ businesses think they will be breached: Here's why: Read the article NOW
- Help us better understand the trends and major practices related to technology use in STEM education. Take this two minute survey NOW.
- F5 Security Hub NEW Look - Try us out today