RSS

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a question

Join Now or Sign In to ask a question.
landon
1 min ago

When evaluating a data center’s efficiency, what is a realistic Power Usage Effectiveness (PUE) number for a “green” data center?

ehtan
46 min ago

Are these just two versions of the same software? Is there any advantage of one over the other?

mandril
12 hours ago

When is the deadline for making a public comment to the FCC in support of net neutrality?

zeeman
12 hours ago

I’m sure this is sounds silly to Mac users, but I grew up with C64s and DOS before moving onto Windows and I don’t have a lot of experience with Macs....

2 Answers |
jlister
12 hours ago

Has all of the news about the NSA spying on pretty much everyone and intercepting much of the electronic communication in the US slowed cloud adoption? I...

2 Answers |
cuetip
12 hours ago

My monitor is nice a large and clear, but one corner has a problem with backlight bleed. Whenever the image on the screen is dark, it has a light corner...

mcmillanpeter14
12 hours ago

Yesterday when I tried to open my Notes mail, the following error flashed on the screen:‘RRV Bucket is Corrupt’. The error would be occurring due to corrupt...

owen
12 hours ago

How can I remove all the metadata from Excel files before sharing them with another company?

2 Answers |
TravisT
12 hours ago

How can I make sure TRIM is working after I install a new SSD on a Windows 7 PC that came with a HDD (will be reinstalling Windows 7)?

Tags: SSD, TRIM, Windows 7 |
2 Answers |
jackson
12 hours ago

I don’t always go through the steps to properly eject SD cards from computers at work before I remove them. I usually use a USB reader, but on some laptops...

Tags: sd card, usb |
2 Answers |
An iPhone user has filed a lawsuit for invasion of privacy against Apple, about a week after a Chinese state broadcaster raised security concerns about the device's location-tracking functions.
Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational.
A method for tracking users across the Internet called "canvas fingerprinting" is simple to stop, but average Internet users may not know how to do it.
Chinese search giant Baidu reported a 34 percent jump in profit for the second quarter, with mobile ad sales accounting for almost a third of revenue for the first time.
The expected boom in demand for small, often isolated devices in the Internet of Things is driving developers to craft new types of components.
A hacker group calling itself "Anonymous Kenya" has poked holes at the government's cybersecurity preparedness by hacking two official Twitter accounts.
Hydraulic actuators, battery stacks, biochemical systems and disease propagation are but a few things that now can be modeled more easily, thanks to a number of libraries and a library store that Wolfram Research has created for a new edition of its SystemModeler software package.
The U.S. State Department's main computer system for processing passport and visa applications crashed earlier this week leading to global delays for travel documents.
The first third-party chips and servers licensed to use IBM's Power architecture will be on the market early next year.
Wi-Fi technology continues to evolve as wireless devices proliferate and demand for video and other data explodes.
Today's question
How prevalent is 'private power generation' for data centers becoming?

Answer this question now!
Submitted by nrichmond
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+