Internet-based applications and services - News, Features, and Slideshows
- SMBs get their very own Salesforce app store
- Slack now letting employers tap workers' private chats
- Google's gigabit-Internet service in Austin priced at US$70 per month
Internet-based applications and services in pictures
Bitcoin exchange Kraken will help probe missing bitcoins as part of the liquidation of MtGox, once the world's largest trading place for the digital currency.
By Tim Hornyak | 26 November, 2014 22:26
If ads on Twitter weren't annoying enough, some will start asking for your credit card info, in the hopes you'll load up on store discounts.
By Zach Miners | 26 November, 2014 05:08
Google will offer a basic version of its broadband service for no monthly charge when it launches soon in Austin, Texas, with the 1Gbps service priced at US$70 per month.
By Zach Miners | 25 November, 2014 11:42
Slack, whose chat app aims to help workers get stuff done, might now have them running scared, knowing the boss could access their chats.
By Zach Miners | 25 November, 2014 07:43
Users of Desk.com, Salesforce's cloud-based customer service product for small and medium-size businesses, now have an app store designed just for them. Called Desk.com App Hub, the store offers 50 apps from Salesforce partner companies that handle functions including group chat, social monitoring, language translation and e-commerce analytics.
By Fred O'Connor | 25 November, 2014 05:18
Saving a destination in Google Maps makes it easier to navigate to and also lessens the chance for error when entering or trying to remember an address.
By Nick Barber | 22 May, 2013 17:54
You just left cocktail hour or a networking event and forgot to grab a business card from the person you'd been chatting with. Don't kick yourself. Instead, log on to LinkedIn to do some cyberstalking. It's a much better resource than Facebook, because with just bits and pieces of information, you're still likely to be able to find your target.
By Nick Barber | 12 February, 2013 22:28
When I signed up for a Twitter account in the summer of 2009 I spent some time thinking about whether or not I should protect my tweets. As a novice Twitter user, I had to decide whether the benefits of protecting my tweets outweighed the drawbacks. Looking back, I do not regret my decision to protect my tweets, and I'll tell you why.
By Phil Shapiro | 23 February, 2011 09:14
There are two ways to think about #GamerGate.
By Matt Weinberger | 30 October, 2014 09:03
People may feel overwhelmed by the deluge of email arriving in their inboxes, but will they trust Google to show them the most important messages?
By Sharon Gaudin | 24 October, 2014 06:57
With Google's social network coming up on its third anniversary, industry analysts are wondering if the company is rethinking Google+ and where it goes from here.
By Sharon Gaudin | 21 June, 2014 06:28
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTAcquisition Marketing ExceutiveNSW
- FTStudio Design ManagerVIC
- FTProgram Manager - Integration & SolutionsNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTSenior SEO ManagerNSW
- FTStudio Design ManagerVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
- Microsoft fingered as company forced to pay $136M in back taxes in China
- Here's why hydrogen-fueled cars aren't little Hindenburgs
- Kraken to help probe missing bitcoins in MtGox liquidation
- UN committee calls on countries to protect right to privacy
- ASIC chief calls for focus on 'cyber resilience'
- Sony to offer refunds over misleading PS Vita ads
- NSW Rural Fire Service cuts travel costs by using video conferencing
- How multisig can alleviate Bitcoin consumer protection concerns
- Treat Bitcoin like currency, advocates tell Senate inquiry
- Hack the halls: Watch out for Cyber Monday scamathon
- NASA creates first 3D printed object in space
- Home Depot spent $43 million on data breach in just one quarter
- Breaking up is hard to do, but HP won't look back
- New eftpos debit, credit chip cards include EMV security
- San Francisco DA pushes for chip payment cards in tech's backyard