- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
- Brisbane to Gladstone yacht race fans track progress in real time
- Glass all gone after one-day sale, Google says
Internet-based applications and services in pictures
Users of Google Glass will get to meet and compare their techie headgear this weekend at a spot where appearance is everything.
By Zach Miners | 19 April, 2014 09:56
Although Exadata is Oracle's most popular and mature "engineered system," some customers implementing the database machine are making mistakes that prevent them from getting the most performance out of the expensive product, according to a veteran of many Exadata projects.
By Chris Kanaracus | 19 April, 2014 06:14
Tech workers suing over an alleged no-poaching agreement among Silicon Valley firms are fighting an attempt by defendants to ban evidence that might portray Steve Jobs as a bad guy.
By Zach Miners | 19 April, 2014 05:44
The clock may be running out on Mt. Gox, but a consortium of investors still wants to relaunch the failed Bitcoin exchange.
By Tim Hornyak | 18 April, 2014 18:35
Saving a destination in Google Maps makes it easier to navigate to and also lessens the chance for error when entering or trying to remember an address.
By Nick Barber | 22 May, 2013 17:54
You just left cocktail hour or a networking event and forgot to grab a business card from the person you'd been chatting with. Don't kick yourself. Instead, log on to LinkedIn to do some cyberstalking. It's a much better resource than Facebook, because with just bits and pieces of information, you're still likely to be able to find your target.
By Nick Barber | 12 February, 2013 22:28
When I signed up for a Twitter account in the summer of 2009 I spent some time thinking about whether or not I should protect my tweets. As a novice Twitter user, I had to decide whether the benefits of protecting my tweets outweighed the drawbacks. Looking back, I do not regret my decision to protect my tweets, and I'll tell you why.
By Phil Shapiro | 23 February, 2011 09:14
With its acquisition of virtual reality gaming company Oculus VR , Facebook may have found a way to lure back younger users to the social network.
By Sharon Gaudin | 26 March, 2014 20:15
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
By Marc Ferranti | 06 March, 2014 22:06
Facebook may be shelling out $19 billion in cash and stock for the messaging company WhatsApp to stanch the departure of younger users from the social network.
By Sharon Gaudin | 20 February, 2014 19:54
Microsoft's Dynamics ERP and CRM product lines seemed safe immediately following former CEO Steve Ballmer's sweeping reorganization of the company last year. But now that longtime Microsoft executive Satya Nadella has been named Ballmer's successor, the time is ripe for more focused speculation on the future of Dynamics. Here's a look at what could be in store.
By Chris Kanaracus | 06 February, 2014 18:50
Learn how every business can improve efficiency, compete better, and deliver compelling user experiences with flash. You'll also gain access to Gartner's 2013 Cool Vendor Report Download our ebook and learn how you can: - Improve efficiency - Compete better - Deliver compelling user experiences
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTIT Support EngineerNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTOBIEE BI/DW ConsultantNSW
- FTContent StrategistNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTDeliverability SpecialistNSW
This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
- Microsoft takes Iowa from corn to .com
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines