leap flag
standing out

isis fighter

ISIS uses US hosting services to avoid intelligence agencies

Ira Winkler and Araceli Treu Gomes learn that ISIS has purposefully been using Google and Amazon Web Services to avoid US and international intelligence agencies.

traffic jam

LTE-U: A quick explainer

LTE-U is a wireless network technology that’s promising a lot, as well as ruffling a few feathers (especially in the Wi-Fi world). Here’s a brief rundown for the perplexed.

carlos matos

Where does SDN make sense? We ask Fidelity’s Director of Global Network Architecture

Carlos Matos has been following Software Defined Networking from the get go as one of the earliest members of the Open Networking Users Group (ONUG). We recently caught up with Matos to get his view on how companies are likely to...

This or that

Native vs. HTML5 vs. hybrid mobile apps: The pros and cons

Key considerations for choosing the best mobile development environment for your organizations.

Close up a guitar string being strummed using an SD memory card

Ode to a node: Sampling technology’s musical side

Rather than simply being a tool for recording and playback, technology has also inspired and generated original music over the years

bitcoin tranactions

CIO says blockchain 'will heavily impact' financial services

Oliver Bussmann, CIO of UBS, says the blockchain technology underlying Bitcoin and other cryptocurrencies can pare transaction processing time from days to minutes. Under his leadership, UBS is building innovation centers where...

081715 line

At what point do white hat hackers cross the ethical line?

If the intention is pure, does that make it ok?

moving truck boxes containers

DCHQ Releases Docker management product into GA with 35 enterprise users

Who said that startups are all about marketing and buzz and can't expect to actually have customers using their products? DCHQ pours scorn on that view with a product launch that already claims enterprise users.

no flash

Tested: How Flash destroys your browser's performance

It’s a memory hog -- and we’ve got the numbers to prove it.

nww firstlook libreoffice5 slide 01

First Look: LibreOffice 5.0 free and open source suite

LibreOffice 5.0 is here!The landmark 5.0 release of LibreOffice, generally considered the strongest FOSS alternative to Microsoft Office as a productivity suite, is officially out today. The new version packs a lot of visible and...

Cartoon about mobile phone types at summer camp

Pity the poor Windows Phone kids at summer camp [CARTOON]

Summer camp is different now than it used to be

cloud storage hp

Replace your NAS with cloud storage: the 8 key requirements

For cloud storage to be useful for unstructured data, it needs to provide equivalent flexibility, performance and productivity as enterprise storage systems

insider cloud

Let users choose enterprise cloud applications

It will benefit your organization, make you look like a hero and increase your job security


iPhone 7 rumor rollup: Apple’s going to build a bazillion iPhones, but how many will be bought?

This week, you can almost hear the production lines spinning into action in China, churning out iPhone-related rumors and titillation. Here’s the past few days’ worth of innuendo and intrigue about Apple’s next-generation device.

OpenStack Vancouver 2015

The era of OpenStack Interoperability will change the cloud as we know it

Support for the new federated identity feature brings us one step closer to the realization of a global network of clouds.

hindenburg burning

Hyper-V tuning: Linux virtual machine over iSCSI follow up

The problem and the solution to the Linux virtual machine file system errors I've been experiencing

cloud contracts thinkstock

Office 365 vs. Google for Work: A cloud comparison for small businesses

With competitive and relatively affordable prices, the choice between Google and Microsoft comes down to comfort, familiarity and brand affinity.

it security salaries

10 highest-paying IT security jobs

High-profile security breaches, data loss and the need for companies to safeguard themselves against attacks is driving salaries for IT security specialists through the roof. Here are the 10 highest-paying security roles.

Load More