Ask a question
2 weeks ago
I checked my Google account activity using the link at the bottom right of Gmail (saw this on an ITworld question last week, incidentally), and under “...
13 weeks ago
I’m not sure that I like Google’s new “feature” that will allow strangers to use Google+ to send me potentially unwanted emails. Can I turn this off?
Borrowing a page from the recently revised Microsoft playbook, development tools maker Telerik has released as open source the bulk of its Kendo software library of components for building Web and mobile applications
A Space X Falcon rocket lifted off Friday afternoon for the International Space Station (ISS) from the Cape Canaveral Air Station in Florida.
Advanced Micro Devices doesn't want its chips in low-priced tablets, and is eager to avoid a battle with Intel or ARM, whose chips have driven tablet prices down to under US$100.
Although Exadata is Oracle's most popular and mature "engineered system," some customers implementing the database machine are making mistakes that prevent them from getting the most performance out of the expensive product, according to a veteran of many Exadata projects.
Tech workers suing over an alleged no-poaching agreement among Silicon Valley firms are fighting an attempt by defendants to ban evidence that might portray Steve Jobs as a bad guy.
Almost 500,000 patient records have been hacked from the servers of the Harley Medical Group, the plastic surgery firm which has clinics across the UK.
The U.S. Federal Communications Commission will reserve a significant amount of spectrum in its upcoming auctions of the television band for unlicensed uses such as Wi-Fi, agency officials said Friday.
Can plastic materials morph into computers? A research breakthrough published this week brings such a possibility closer to reality.
Even four months after the Mac Pro's initial release, Apple appears to be having problems making enough of the high-end cylindrical desktop computer. The company's store currently shows shipping times of 4-5 weeks for all Mac Pro models, even the stock versions without additional customizations.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
White Papers & Webcasts
Webcast On Demand
Sponsor: HP and Intel®