RSS

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a question

Join Now or Sign In to ask a question.
helenamy
2 hours ago

I've got a password protected pdf file from my boss, I need to open and edit it. Anyone know how to remove the password of it?

PaxProSe
2 hours ago

I got a flyer from my company’s insurance broker advertising "cyber insurance" today. I didn’t realize this was a product that existed. At first I just...

JOiseau
3 hours ago

This week Facebook rolled out “Nearby Friends” a new location sharing feature. I don’t need to share with everyone where I am all the time, and I don’t want...

ttopp
3 hours ago

When I’m using open WiFi networks for anything more than a quick bit of casual browsing, what steps are necessary to stay secure?

owen
3 hours ago

I was a little surprised to see Microsoft Word on the Chrome Web Store. Since Office Online is already cloud based, and Word on Chrome will be cloud based,...

MGaluzzi
8 hours ago

The options for protecting against DDoS attacks basically comes down to a hardware based or cloud based solution. Hardware is the traditional way and if...

SilverHawk
8 hours ago

After years of the wireless industry arguing against having kill switches in smartphones and opposing regulations that would mandate it, there was an...

blackdog
8 hours ago

Lately, every time I start Firefox I get a message that says “you’ve been updated to the latest version of Firefox.” I know that Firefox updates...

Josh Garrett
23 hours ago

I am in my 30's, and I want to start a new career. My questions are intentionally broad, since I want to get several viewpoints as to what my options are. I...

dayzsunny
1 day ago

I’m a little confused about VoIP telephony terminology, specifically the term “SIP Trunking.”. Is SIP Trunking just another way to say VoIP, or does it...

Tags: sip trunking, voip |
1 Answer |
Even four months after the Mac Pro's initial release, Apple appears to be having problems making enough of the high-end cylindrical desktop computer. The company's store currently shows shipping times of 4-5 weeks for all Mac Pro models, even the stock versions without additional customizations.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
Vendors will tell you that the Internet of Things (IoT) has arrived. We're here to tell you that it hasn't.
Those predicting the doom of Android because of the iPhone 6 are quite wrong. Plus: Take a screenshot tour of Ubuntu 14.04 LTS, and does Linux disappoint some Windows users?
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
Twitter's new mobile advertising suite lets companies pitch their mobile apps in promoted tweets or place ads inside other apps.
Sure, you’ve changed a bunch of passwords, but are you doing all you can to protect yourself?
Also Spiderman may be avoiding the Xbox One, and Playstation Now is coming to Bravia TVs
Formula One racing and cryptocurrency have nearly nothing in common -- except Suzuka. The home of the Japanese Grand Prix will soon debut Japan's first bitcoin ATM.
The clock may be running out on Mt. Gox, but a consortium of investors still wants to relaunch the failed Bitcoin exchange.
Today's question
What are my options for cloud-based IT service management software?

Answer this question now!
Submitted by afinch

White Papers & Webcasts

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness