slideshow - News, Features, and Slideshows
Here are five smartphones that have been, or will be, released this year running unofficial versions of Android.
By Howard Wen | 22 July, 2014 08:19
There's no need for a portable phone charger to be boring -- here are 11 chargers for your smartphone (or tablet) that are both useful and creative.
By Rebecca Linke | 21 July, 2014 08:23
2014 has featured crop circles, advanced toilet tech, flying saucers, wild software development
By Michael Cooney | 18 July, 2014 09:07
Mozilla has its hands in many projects aimed at advancing the Web. Here's our take on the 10 most promising
By Serdar Yegulalp | 18 July, 2014 07:50
Keep in touch with co-workers, track your time, and block distractions with these apps and services.
By Christopher Null | 17 July, 2014 07:46
VoIP PBXes, NTP servers, Web-controlled power strips - hack together one of these handy, cheap solutions for the server closet and beyond
By Brian Chee | 11 July, 2014 08:40
Seven years after its initial launch, the iPhone has come a long way in terms of its feature set.
By Yoni Heisler | 11 July, 2014 08:36
We all know what a picture's worth. These websites use graphics to display everything from Twitter traffic to births and deaths, in ways that truly drive home what words alone cannot.
By Brad Chacos | 09 July, 2014 08:45
How technology is bringing out the best and the oh-so utterly worst in solar innovation
By John Cox | 09 July, 2014 08:40
CEO pay packages include perks such as access to the corporate jet, home security, and financial planning advice.
By Ann Bednarz | 08 July, 2014 08:27
Options that trick you into installing potentially unwanted programs are common during the setup of free tools and programs. Here's how to spot them and keep them off your system.
By Lincoln Spector | 03 July, 2014 08:01
Android L is full of tweaks and enhancements. Here are just a few!
By Networkworld Staff | 02 July, 2014 08:50
NASA system looks to safely land larger spacecraft on Mars
By Michael Cooney | 02 July, 2014 08:41
Staying safe these digital days takes more than antivirus. Here are 10 fundamental things you do to protect your PC and other devices.
By Ian Paul | 01 July, 2014 08:51
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
Today’s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers to damage web-facing applications by exhausting resources. F5 BIG-IP ASM provides application-layer protection against DDoS attacks.
- Small cell device tech set to connect workplace Wi-Fi with 3G and LTE
- Want an Apple watch? Just 3D print one
- NASA upgrades humanoid robot in space
- What to listen for during Apple's earnings call today
- IEEE forms 25G Ethernet study group
- Intel releases its most reliable pro SSD
- Apple gets patent on iTime smart watch
- Dating app Wyldfire tries to avoid creeps by letting women take the lead
- Tor Project working to fix weakness that can unmask users
- Cybercrime wave whacks European banks
- Hands on with Xiaomi's Mi 4, a high-end handset, with an iPhone look
- Teradata acquires assets of Hadapt, Revelytix for big data
- Verizon revenue rises steadily, driven by wireless service growth
- Members of UK Parliament call for judicial review of data retention law
- Big Switch aims to control the cloud with SDN product