RSS

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a question

Join Now or Sign In to ask a question.
ehtan
20 min ago

Are these just two versions of the same software? Is there any advantage of one over the other?

mandril
11 hours ago

When is the deadline for making a public comment to the FCC in support of net neutrality?

zeeman
11 hours ago

I’m sure this is sounds silly to Mac users, but I grew up with C64s and DOS before moving onto Windows and I don’t have a lot of experience with Macs....

2 Answers |
jlister
11 hours ago

Has all of the news about the NSA spying on pretty much everyone and intercepting much of the electronic communication in the US slowed cloud adoption? I...

2 Answers |
cuetip
11 hours ago

My monitor is nice a large and clear, but one corner has a problem with backlight bleed. Whenever the image on the screen is dark, it has a light corner...

mcmillanpeter14
11 hours ago

Yesterday when I tried to open my Notes mail, the following error flashed on the screen:‘RRV Bucket is Corrupt’. The error would be occurring due to corrupt...

owen
11 hours ago

How can I remove all the metadata from Excel files before sharing them with another company?

2 Answers |
TravisT
11 hours ago

How can I make sure TRIM is working after I install a new SSD on a Windows 7 PC that came with a HDD (will be reinstalling Windows 7)?

Tags: SSD, TRIM, Windows 7 |
2 Answers |
jackson
11 hours ago

I don’t always go through the steps to properly eject SD cards from computers at work before I remove them. I usually use a USB reader, but on some laptops...

Tags: sd card, usb |
2 Answers |
aiden
11 hours ago

I was surprised to see the news that included in the massive 18,000 job cuts is the elimination of XBox Entertainment Studios. I thought that Microsoft was...

Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational.
A method for tracking users across the Internet called "canvas fingerprinting" is simple to stop, but average Internet users may not know how to do it.
Chinese search giant Baidu reported a 34 percent jump in profit for the second quarter, with mobile ad sales accounting for almost a third of revenue for the first time.
The expected boom in demand for small, often isolated devices in the Internet of Things is driving developers to craft new types of components.
A hacker group calling itself "Anonymous Kenya" has poked holes at the government's cybersecurity preparedness by hacking two official Twitter accounts.
Hydraulic actuators, battery stacks, biochemical systems and disease propagation are but a few things that now can be modeled more easily, thanks to a number of libraries and a library store that Wolfram Research has created for a new edition of its SystemModeler software package.
The U.S. State Department's main computer system for processing passport and visa applications crashed earlier this week leading to global delays for travel documents.
The first third-party chips and servers licensed to use IBM's Power architecture will be on the market early next year.
Wi-Fi technology continues to evolve as wireless devices proliferate and demand for video and other data explodes.
A new model of the Raspberry Pi is out, but it's not Raspberry Pi 2
Today's question
How prevalent is 'private power generation' for data centers becoming?

Answer this question now!
Submitted by nrichmond
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness