Google missed analyst forecasts for both earnings and income in the third quarter, while the amount it makes when users click on ads also dipped.
By Zach Miners | 17 October, 2014 08:22
AMD's new chief is making her mark quickly: By the end of 2014, the chipmaker will cut worldwide headcount by about 7 percent in a restructuring plan it hopes will put it on the path to improved profits.
By Agam Shah | 17 October, 2014 08:12
Apple today unveiled the 9.7-in. iPad Air 2 and the smaller 7.9-in. iPad Mini 3, both revisions of their predecessors, with the new Mini getting the shortest shrift on stage time and changes.
By Gregg Keizer | 17 October, 2014 07:39
This smartphone thing may finally be catching on.
By Grant Gross | 17 October, 2014 06:45
Apple has jumped past trendy 4K displays and instead put a 5K monitor in its new 27-inch iMac all-in-one computer.
By Agam Shah | 17 October, 2014 06:38
The upside of life as an IT contractor is alluring. You get to be your own boss, accept only the jobs you want, and work flexible hours. With each assignment comes the opportunity to learn new skills and gain exposure to different environments.
By Ann Bednarz | 17 October, 2014 06:16
Apple desktop and laptop computers will play better with iPads and iPhones via new Continuity integration features on iOS 8.1 and MacOS X Yosemite, available free, starting Monday for iOS 8.1 and today for Yosemite.
By Juan Carlos Perez | 17 October, 2014 05:55
Apple's iPad Air 2 is thinner and lighter than its predecessor, and should be speedier as well, thanks to a new processor.
By Agam Shah | 17 October, 2014 05:55
In their zeal to collect as much operational data as possible, organizations hoping to gain an advantage through the use of big data will also need to rethink how they process, analyze and present that material.
By Joab Jackson | 17 October, 2014 05:32
Apple has launched OS X 10.10, aka Yosemite, as a free upgrade for most Mac owners.
By Gregg Keizer | 17 October, 2014 05:05
Apple will introduce new iPads today in the hope they will rejuvenate sales, whose growth has slumped in the first two quarters of 2014.
By Gregg Keizer | 17 October, 2014 04:17
Apple and Google should reconsider their plans to enable encryption by default on their smartphones, and the U.S. Congress should pass a law requiring that all communication tools allow police access to user data, U.S. FBI Director James Comey said.
By Grant Gross | 17 October, 2014 04:02
No matter what images we have from the Borg on Star Trek or the Cylons on Battlestar Galactica, NASA says the future of space exploration is all about human and robotic cooperation.
By Sharon Gaudin | 17 October, 2014 03:49
Attackers are mounting distributed Denial-of-service attacks from home routers, wireless access points, cable modems, Web cams and printers by taking advantage of weaknesses in the protocol they use to announce themselves on networks, according to PLXsert.
By Tim Greene | 17 October, 2014 03:32
Isolating computers from the Internet, called "air gapping," is considered one of the best ways to defend critical systems and their sensitive data from cyberattacks, but researchers have found that can be undermined using an all-in-one printer.
By Lucian Constantin | 17 October, 2014 03:03
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
- FTSEM Specialist - SEM AnalystNSW
- FTCampaign Managers | Programmatic / RTB | Display + Video | Trading desk |SydneyNSW
- FTStrategic Account Manager - Google AnalyticsNSW
- FTDigital Performance Manager - MediaNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTData Product SpecialistNSW
- FTAccount Manager - DataNSW
Face it. Modern workers are addicted to mobile devices. Not just any vanilla corporate-issued devices, but our carefully selected and personalized expressions of ourselves: iPads®, iPhones®, Androids™ and whatever-comes-next. Many of us get to use our devices in the office. According to Gartner, “IT leaders have a positive view of BYOD”1, implying that this is now a mainstream model. In supporting employee devices, companies tend to exert either very little control, or a stifling amount of control. The approach taken depends on which community has the upper hand: the employees or IT.
- Aussie university teams take to the ocean for robot challenge
- Enterprise must shake core to be innovative: Telstra
- NASA's Mars orbiters survive comet flyby and sneak once-in-a-lifetime peek
- China again blames US for disrupted cybersecurity talks
- Former AAPT CEO joins Nextgen Networks
- Is your Ethernet fast enough? Four new speeds are in the works
- Dropbox used for convincing phishing attack
- IBM 'major announcement' points to deal on chip manufacturing
- NBN: Is your suburb getting FTTN?
- In Pictures: ITworld cartoons 2014 - The year in geek humour, Part 1
- In Pictures: Apple's most important iPad, iMac, OS X Yosemite, and other announcements last week
- Obama orders chip-and-PIN in government credit cards
- Snapchat rolling out non-'creepy' ads that still might get creepy
- Apple's iPad Air 2 chip paves the way for new devices
- Startup offers a big-data storyteller