While Google and Microsoft are using large amounts of free cloud storage to sell inexpensive consumer notebooks, Apple has stood above the fray.
By Gregg Keizer | 24 November, 2014 12:43
It was all the way back in the Spring of 2011 that Google released WebRTC, its nascent real-time, browser-based, HTML5-powered, no-plugin-required video chat project to the public. In the three and a half years since, the Internet Engineering Task Force and the W3C have been working together to try to formalize the standard, prepare the stable 1.0 release, and get it ready for prime time.
By Matt Weinberger | 22 November, 2014 01:07
Welcome to the age of containerization, where an ecosystem led by startup Docker is leading IT organizations to ineffable peaks of efficiency, helping them scale their workloads ever-higher, and probably baking them a nice cake to boot (it's my birthday, I have cake on the brain, sue me). Microsoft, Google and Amazon Web Services are all tripping over themselves to make sure prospective customers know that their clouds are the place to be if you want to get the most from Docker.
By Matt Weinberger | 21 November, 2014 22:31
In early October, Evernote CEO Phil Libin debuted new features designed to make the immensely popular note-taking software friendlier to the enterprise: Work Chat, Context and presentation mode.
By Matt Weinberger | 19 November, 2014 04:00
Capacity planning needs to provide answers to two questions: What are you going to need to buy in the coming year? And when are you going to need to buy it?
By Thomas A. Limoncelli, Strata R. Chalup and Christina J. Hogan | 14 November, 2014 05:59
By now, you've likely heard about Inbox, Google's bold new plan to reinvent email with a smarter, more context-sensitive interface that treats messaging like just another to-do list.
By Matt Weinberger | 25 October, 2014 05:30
Managing the wireless environment at the average college or university can be a difficult task at the best of times, and when students and staff start using personal hotspots the sort that provide wireless data access from the same -- it's not the best of times.
By Jon Gold | 08 October, 2014 03:16
The definition of Software Defined Networking (SDN) continues to broaden, today including functions such as configuration automation and orchestration. While these tasks aren't strictly SDN, the fact is software is used to define some aspect of the network infrastructure in both cases, so vendors have stretched the definition of SDN to bring configuration automation and orchestration platforms into the mix. In fairness, the line gets blurry, as some modern orchestration systems use programmatic interfaces to provision the network instead of traditional configuration tools such as SSH or SNMP.
By Ethan Banks | 09 September, 2014 23:39
Today many IT executives choose open source over proprietary software for everything from cloud computing to facilitating teamwork among remote workers. Open source increases security and privacy, encourages an engaged community and offers the ability to "look under the hood" to diagnose and resolve issues quickly.
By Rob Howard | 06 September, 2014 06:44
From the vantage point of most people, even technical folks, Active Directory (AD) seems like it's doing pretty well. How often can you not log in when you sit down at your PC? How often do you fail to find someone in the corporate directory in Outlook? How many times have you heard of an AD outage?
By By Jonathan Sander, Strategy & Research Officer, STEALTHbits | 06 September, 2014 06:07
VMWorld 2014 was a whirlwind. The conference last week attracted 22,000 attendees, more than 250 exhibitors and spread across all three buildings of the Moscone Center in downtown San Francisco over a five-day period.
By Brandon Butler | 03 September, 2014 07:02
Some of the world's largest businesses say their Cobol application infrastructure, running on state-of-the-art big iron, still delivers a powerful competitive advantage. The challenge going forward will be staffing it.
By Robert L. Mitchell | 21 August, 2014 20:39
Historically, cloud BI has been mostly used by smaller businesses, but larger enterprises are starting to make the trek.
By Nancy Gohring | 20 August, 2014 20:48
Sprint's new lower-priced shared data plan sounds ambitious, but analysts say it doesn't go far enough and won't address the carrier's network performance sore spot.
By Matt Hamblen | 20 August, 2014 20:20
The Internet of Things is still too hard. Even some of its biggest backers say so.
By Stephen Lawson | 14 August, 2014 01:22
A long time ago, developers wrote assembly code that ran fast and light. On good days, they had enough money in their budget to hire someone to toggle all those switches on the front of the machine to input their code. On bad days, they flipped the switches themselves. Life was simple: The software loaded data from memory, did some arithmetic, and sent it back. That was all.
By Peter Wayner | 11 August, 2014 23:51
Google recently announced a new networking protocol called Thread that aims to create a standard for communication between connected household devices.
By Colin Neagle | 22 July, 2014 05:31
The new Apple-IBM partnership seems sure to help Apple sell more iPads to businesses, but it may also be setting off alarm bells at mobile device management companies large and small.
By Matt Hamblen | 17 July, 2014 02:57
See who's made the list the last 21 years.
By Computerworld Staff | 23 June, 2014 20:04
With its new Fire Phone, Amazon is primarily interested in connecting to its 250 million Amazon and Prime customers with a phone that makes it quick and easy to shop over the Web.
By Matt Hamblen | 19 June, 2014 09:38
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTSenior SEO ManagerNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTStudio Design ManagerVIC
- FTAcquisition Marketing ExceutiveNSW
- FTProgram Manager - Integration & SolutionsNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTStudio Design ManagerVIC
- FTChief Information Officer - CSIROACT
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
- Senate backs Ludlam on data retention costs
- Merchants welcome Square to Australia
- Report: Samsung's head of TVs may be asked to revitalize mobile business
- Webcam snooper now looking for a job
- Telstra targets government with secure cloud offer
- Australia, Canada, UK and China weigh in on Insecam privacy issue
- Traces of Regin malware may date back to 2006
- Analyst, Vodafone cast doubt on likelihood of telco's sale
- Symantec identifies sophisticated, stealthy 'Regin' malware
- Spliddit: Algorithms to divide the rent, stuff, or credit fairly between people
- Why is Microsoft updating Windows PCs for a security bug on the server?
- Prices for 4K monitors sink below $500
- Apple's $450 million e-books settlement gets final approval
- Black Friday: Newegg axes prices on laptops, desktops, tablets and more
- Reports: EU taking first step towards breaking up Google