applications - News, Features, and Slideshows
- New SAP Hana tool aims to put Big Data insights within closer reach
- Microsoft's stream processing engine boosts Bing, Azure services
- Windows 10 Spartan browser will get extensions
applications in pictures
Apple's efforts this week to remedy the Wi-Fi connectivity issues plaguing many OS X users produced mediocre results, judging by comments left in Apple's support forum.
By Fred O'Connor | 30 January, 2015 06:51
Microsoft has made its Word, Excel and Powerpoint apps for Google's Android OS generally available, and also released new Outlook apps for Android and Apple's iOS.
By Mikael Ricknäs | 30 January, 2015 00:09
Microsoft's Internet Explorer development team has confirmed there will be a browser extension system for Project Spartan, meaning developers will be able to extend its functionality with software that can be built directly into the browser.
By Scott M. Fulton III | 28 January, 2015 11:59
A streaming analytics engine developed by Microsoft Research is giving advertisers on the company's Bing Web search service more timely analysis on how their ad campaigns are faring, according to the company.
By Joab Jackson | 28 January, 2015 08:53
Everyone wants faster database queries, and both SQL developers and DBAs can turn to many time-tested methods to achieve that goal. Unfortunately, no single method is foolproof or ironclad. But even if there is no right answer to tuning every query, there are plenty of proven do's and don'ts to help light the way. While some are RDBMS-specific, most of these tips apply to any relational database.
By Sean McCown | 17 September, 2014 23:31
Saving a destination in Google Maps makes it easier to navigate to and also lessens the chance for error when entering or trying to remember an address.
By Nick Barber | 22 May, 2013 17:54
Build a better mousetrap, as the cliché has it, and the world will beat a path to your door. That line of thinking has even been applied to the most rudimentary corners of the technology world: standards and protocols that have stuck around for decades, yet viewed as creaky and badly in need of replacement. But few old-guard standards have seen as many pretenders to the throne as the SMTP/POP3/IMAP email triumvirate has. If only someone could come up with an alternative that did everything email did but better, more securely, and with less hassle, wouldn't it be worth it?
By Serdar Yegulalp | 21 January, 2015 01:47
A lot of security processes failed during the breach of Target's systems during last year's holiday season, but one surprising revelation was that the retailer actually did receive security alerts about the malware in its system. Yet because the security team was bombarded with alerts -- estimated at hundreds per day -- it couldn't adequately prioritize them.
By Howard Baldwin | 15 December, 2014 22:40
It was all the way back in the Spring of 2011 that Google released WebRTC, its nascent real-time, browser-based, HTML5-powered, no-plugin-required video chat project to the public. In the three and a half years since, the Internet Engineering Task Force and the W3C have been working together to try to formalize the standard, prepare the stable 1.0 release, and get it ready for prime time.
By Matt Weinberger | 22 November, 2014 01:07
Separate announcements Tuesday for business conferencing services, one from AT&T and the other from Sprint, highlight the radically changing business models at U.S. wireless carriers.
By Matt Hamblen | 19 November, 2014 07:54
In early October, Evernote CEO Phil Libin debuted new features designed to make the immensely popular note-taking software friendlier to the enterprise: Work Chat, Context and presentation mode.
By Matt Weinberger | 19 November, 2014 04:00
Whitepapers about applications
The Application Usage and Threat Report (June 2014) provides a global view into enterprise application usage and the associated cyber threat landscape. Accomplished by summarizing network traffic assessments conducted across more than 5,500 organizations worldwide between March 2013 and March 2014. This version of the report will analyse the relationship between threats and their application vectors. The most surprising data points being both the diversity of applications displaying threat activity and the high concentration of activity surrounding only a few key techniques.
Today’s employees carry smartphones, tablets and laptops and rarely think twice about using their personal devices for work or work devices for personal activities. The mobile workforce will surpass 1.3 billion people, or 37% of the world’s overall workforce, by 2015 according to IDC.1
- VPN providers play 'cat-and-mouse' with China's growing censorship
- Data retention inquiry kept in the dark on costs
- A look at real-time brain-to-exoskeleton information transmission
- Facebook tests delivering tips about your location
- How three small credit card transactions could reveal your identity
- Data retention to involve 'petabytes of data' for Vodafone
- Citrix's 900 job cuts seen as 'defensive' move
- Amazon returns to profit as holiday sales soar
- Uber passenger who alleged Delhi rape sues in US
- Microsoft said to invest in Android maker Cyanogen
- Reddit handed over user info for 58% of government requests
- Google misses with Q4 sales and earnings
- Feds go after operator of revenge porn site
- Renewable energy costs expected to drop 40% in next few years
- Android apostates account for 1-in-5 U.S. iPhone sales