RSS

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a question

Join Now or Sign In to ask a question.
catamount
9 min ago

Apple’s recent quarterly results show that iPad sales are down almost 20% from the previous quarter. That’s a pretty big drop in sales. What’s going on? Is...

Tags: apple, iPad |
dthomas
24 min ago

How do I setup multiple monitors using Windows 8.1?

landon
53 min ago

When evaluating a data center’s efficiency, what is a realistic Power Usage Effectiveness (PUE) number for a “green” data center?

ehtan
1 hour ago

Are these just two versions of the same software? Is there any advantage of one over the other?

mandril
13 hours ago

When is the deadline for making a public comment to the FCC in support of net neutrality?

zeeman
13 hours ago

I’m sure this is sounds silly to Mac users, but I grew up with C64s and DOS before moving onto Windows and I don’t have a lot of experience with Macs....

2 Answers |
jlister
13 hours ago

Has all of the news about the NSA spying on pretty much everyone and intercepting much of the electronic communication in the US slowed cloud adoption? I...

2 Answers |
cuetip
13 hours ago

My monitor is nice a large and clear, but one corner has a problem with backlight bleed. Whenever the image on the screen is dark, it has a light corner...

mcmillanpeter14
13 hours ago

Yesterday when I tried to open my Notes mail, the following error flashed on the screen:‘RRV Bucket is Corrupt’. The error would be occurring due to corrupt...

owen
13 hours ago

How can I remove all the metadata from Excel files before sharing them with another company?

2 Answers |
An iPhone user has filed a lawsuit for invasion of privacy against Apple, about a week after a Chinese state broadcaster raised security concerns about the device's location-tracking functions.
Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational.
A method for tracking users across the Internet called "canvas fingerprinting" is simple to stop, but average Internet users may not know how to do it.
Chinese search giant Baidu reported a 34 percent jump in profit for the second quarter, with mobile ad sales accounting for almost a third of revenue for the first time.
The expected boom in demand for small, often isolated devices in the Internet of Things is driving developers to craft new types of components.
A hacker group calling itself "Anonymous Kenya" has poked holes at the government's cybersecurity preparedness by hacking two official Twitter accounts.
Hydraulic actuators, battery stacks, biochemical systems and disease propagation are but a few things that now can be modeled more easily, thanks to a number of libraries and a library store that Wolfram Research has created for a new edition of its SystemModeler software package.
The U.S. State Department's main computer system for processing passport and visa applications crashed earlier this week leading to global delays for travel documents.
The first third-party chips and servers licensed to use IBM's Power architecture will be on the market early next year.
Wi-Fi technology continues to evolve as wireless devices proliferate and demand for video and other data explodes.
Today's question
How prevalent is 'private power generation' for data centers becoming?

Answer this question now!
Submitted by nrichmond
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+