- Glass all gone after one-day sale, Google says
- Akamai admits its OpenSSL patch was faulty, reissues keys
- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
Microsoft still faces a long road convincing enterprises to choose its Surface tablets over the Apple iPad, according to analysts.
By Adam Bender | 24 September, 2013 11:14
Microsoft's two new tablets, the Surface 2 and the Surface 2 Pro, will go on sale in Australia from 22 October. The tablets will be available for purchase online from Microsoft and in-store at Harvey Norman and JB Hi-Fi.
By Rohan Pearce | 24 September, 2013 11:03
Windows 8 Update: Best liked Microsoft tip: ‘I hate windows 8. How can I deinstall it and load windows 7?
It's been a tough week for Window 8 and Microsoft Surface tablets, highlighted in this discovery by DoMiN8ToR on the MyCE Web site : The best liked tip in the Windows 8 section of Microsoft Community is "How do I downgrade to Windows XP? – Windows 8 Sucks bad."
By Tim Greene | 15 August, 2013 19:15
Windows 8 is just what Microsoft needs to take advantage of the ongoing irreversible shift from PCs to handheld devices including iPads, iPhones and other form factors yet to be designed, according to the company's former OEM chief.
By Tim Greene | 23 January, 2013 23:14
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTMicrosoft Business Intelligence DeveloperNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTContent StrategistNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTOBIEE BI/DW ConsultantNSW
- FTIT Support EngineerNSW
- FTDeliverability SpecialistNSW
Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
- China's Alibaba to offer mobile phone services in June
- Michaels says breach at its stores affected nearly 3M payment cards
- IT security is national security -- but you're not alone
- Exclusive: Google's Project Loon tests move to LTE band in Nevada
- Enterprise who? Google says little about Apps, business cloud services in Q1 report
- Where's my gigabit Internet, anyway?
- Samsung teams with GlobalFoundries on 3D chips
- World Tech Update: Google buys drone maker Titan Aerospace and NHK shows off 8K television
- Music labels sue Pandora over pre-1972 recordings
- AMD's profitability streak ends at two quarters
- Netcraft tool flags websites affected by Heartbleed
- Israeli start-up, working with GE, out to detect Stuxnet-like attacks
- Facebook wants to help you meet friends offline
- Tor anonymity network to shrink as a result of Heartbleed flaw
- For Red Hat, it's RHEL and then...?