software - News, Features, and Slideshows
- Microsoft kills EU browser choice screen
- Microsoft's $84 million man: What's Nadella done to earn it?
- Microsoft files suit against alleged tech support scammers
software in pictures
Chrome security engineers have proposed that all websites that don't encrypt traffic be marked as insecure by browsers.
By Gregg Keizer | 23 December, 2014 02:31
Microsoft wants to help Android, iOS and Windows apps run offline as well as online, offering a way to improve app responsiveness and functionality when network coverage is bad or non-existent.
By Mikael Ricknäs | 19 December, 2014 23:23
Microsoft is finally cracking down on scammers who offer to fix non-existent computer problems for hundreds of dollars. In a first strike, Microsoft sued several U.S. companies it said are involved in fake tech support scams.
By Loek Essers | 19 December, 2014 23:02
As enterprises have increased the number of systems they run on Amazon Web Service's cloud, keeping track of it all has become more difficult. But the company is now trying to rectify that with the help of better tagging.
By Mikael Ricknäs | 19 December, 2014 04:21
Everyone wants faster database queries, and both SQL developers and DBAs can turn to many time-tested methods to achieve that goal. Unfortunately, no single method is foolproof or ironclad. But even if there is no right answer to tuning every query, there are plenty of proven do's and don'ts to help light the way. While some are RDBMS-specific, most of these tips apply to any relational database.
By Sean McCown | 17 September, 2014 23:31
For a project I was recently working on I needed to remove the white background from several hundred images in PNG format and replace it with transparency. I know you can automate Photoshop but that's like getting into a Sherman tank to go shopping at your local supermarket. Another constraint (other than my reluctance to wrangle Photoshop) was the need to be able to do this in the future as part of a process to be built into a virtual machine running Linux.
By Mark Gibbs | 08 September, 2014 22:39
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
By Ashan Willy | 24 June, 2014 04:22
If you work with data much, you don't need a statistical model to predict that the odds of consistently getting data in the format you need for analysis are pretty low. Those who do a great deal of data cleaning and reformatting often turn to scripting languages like Python or specialty tools such as OpenRefine or R.
By Sharon Machlis | 04 March, 2014 14:05
A lot of security processes failed during the breach of Target's systems during last year's holiday season, but one surprising revelation was that the retailer actually did receive security alerts about the malware in its system. Yet because the security team was bombarded with alerts -- estimated at hundreds per day -- it couldn't adequately prioritize them.
By Howard Baldwin | 15 December, 2014 22:40
Long-time Windows users may feel like second-class citizens as Microsoft continues to push its products and services onto alternate platforms, but the problem will clear up next year, analysts predicted today.
By Gregg Keizer | 09 December, 2014 07:56
The causes of the problem remain cloudy, but the symptoms are quite clear. Starting on Nov. 18, some Server 2003, Windows Home Server 2003, and Windows XP SP3 machines suddenly refused to connect to Microsoft Update. As best I can tell, Microsoft has not responded to the problem, not documented a workaround, and is basically doing nothing visible to fix it.
By Woody Leonhard | 25 November, 2014 23:34
Battery power consumption remains a lingering problem on smartphones -- and is getting worse with the latest advances in the devices. But developers can take steps to tackle the issue.
By Paul Krill | 24 November, 2014 22:10
Whitepapers about software
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
In the current market, there is an increasing demand for unbiased information about Enterprise Mobility Management (EMM) solutions. This whitepaper focuses on relevant solutions with an extensive overview of features for comparison. • The paper discusses Application and Desktop Delivery in the mobile world • Details challenges of the consumerisation of IT and BYO in tomorrow’s workspace • Explains the different Mobile Managements concepts, including the pros and cons
- Exploits for dangerous network time protocol vulnerabilities can compromise systems
- Texas Instruments builds an alternative energy for the Internet of Things
- Google Android One phones to sell in three more Asian countries
- Tor warns of possible disruption of network through server seizures
- Sony looking for ways to distribute 'The Interview' online
- Sony hack was 'cyber vandalism,' not act of war, says Obama
- US rejects North Korea offer to investigate Sony hack, reaches out to China
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills