Ask a question
5 weeks ago
There are questions here and on other forums about Linux on a fairly regular basis, and sometimes I find myself automatically thinking...
12 weeks ago
What things will a lifelong Windows user need to adjust to when switching to Linux? Are any of them deal-breakers?
13 weeks ago
I've gotten really tired of using the Unity interface (which I find rather buggy) with Ubuntu and am thinking of jumping ship and...
22 weeks ago
I am running Linux, and installed Samba for file sharing across the network. When the firewall is enabled, Samba will not function. I...
3 Answers |
Updated Apple whitepaper reveals interlocking, defense-in-depth architecture for iPhone, iPad OS.
Forget illicit torrents tossed up by anonymous Russian bloggers: On Thursday, a build of the incoming Windows 8.1 update was leaked by Microsoft itself.
CIOs who haven't moved their companies from Windows XP by now ought to be fired, some people think, but those who haven't and are still on the job have options for saving their bacon.
Automation, virtualization, cloud computing -- these technology trends are transforming the data center and enabling companies to lower costs, increase flexibility and improve reliability. However, these shifts require IT, and their outsourcing providers, to rethink traditional strategies.
With smartphones and tablets increasingly at risk from malware, researchers from North Carolina State University have devised a new and potentially better way to detect it on Android devices.
Samsung hopes its new Milk streaming service is the next big thing in music.
Google and Verizon each made announcements this week that are significant in their race to catch the company many consider to still be the market leader in the IaaS public cloud: Amazon Web Services.
The CIA's decision to use Amazon's cloud is part of a broader IT shake-up to make the spy business more efficient.
The first Cebit trade show in the post-Snowden era will focus on security, showing off locally developed bug-proof phones and messaging systems, as well as the ability to protect mobile devices using smartcards.
A flaw similar to Apple's 'goto fail' bug leaves many Linux variants vulnerable to man-in-the-middle attacks.