Tag: WebEx

Ask a question

Join Now or Sign In to ask a question.
aiden
12 weeks ago

No. When you send out the invitation, it includes a link for the other people to use. They simply click the link, they do not need to sign up for anything...

There's a new Wild West to be tamed: all those (uncoordinated) data analytics projects sprouting throughout your organization.
The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers.
The year since our previous Global Information Security Survey won't go down as one of the better years for information security. In fact, it may go down as one of the most grueling.
Instead of having to rely on watered-down Photoshop clones, Chromebook users could eventually get the real thing.
Small and medium-size U.S. companies should band together on cybersecurity systems as a way to pool limited resources against increasingly sophisticated attackers, the former director of the U.S. National Security Agency said Tuesday.
Systems support company IPsoft is testing new virtual help software that it says will help answer customer technical questions much more quickly and thoroughly than today's current crop of online assistants.
TiVo's Android app now supports streaming. Plus: A guide to Android for beginners, and go hands on with Nokia's offline maps for Android.
Microsoft's major update to its operating system, called Windows 10 and unveiled Tuesday, has been built to blend old and new in a way that will be familiar to Windows 7 users while also retaining much of its more modern tile interface.
Earlier this month, Microsoft quietly appointed software architect Mark Russinovich as chief technology officer for its Azure cloud computing platform, formalizing a role he's been executing for the past several years.
Four alleged members of an international computer hacking ring face charges in the U.S. of breaking into the computer networks of the U.S. Army and several tech companies and stealing several software packages, including programs used to train Army helicopter pilots.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

White Papers & Webcasts

See more White Papers | Webcasts

randomness