Topic: Networking

Computer networking news, reviews, solutions, and analysis for IT professionals

Ask a question

Join Now or Sign In to ask a question.
MGaluzzi
16 hours ago

Due to recent court decisions, the FCC is limited in the oversight and restrictions it can impose on ISPs. It has been argued that the only way the FCC can...

1 Answer |
andymorghan
2 days ago

How can I track what employees are downloading (i.e. movies)? I don't have a server in my office. Each system is connected through a switch and we have 3 to...

2 Answers |
dthomas
1 week ago

I have a friend who can't remember her WiFi password and didn't write it down anywhere. I have it stored on my Android phone (Galaxy S2...

ernard
2 weeks ago

I was trying to add a new PC to my little 5 computer network, and realized that I have no idea what the password is for my wireless router. I changed it...

7 Answers |
dbrown
2 weeks ago

I’m not very familiar with OS X, and after setting up a network with a Windows 7 PCs and a Mac, the Mac doesn’t see the PC. When I look in the finder bar on...

Tags: mac, OS X, Windows 7 |
2 Answers |
tswayne
2 weeks ago

Is this just a marketing term for a proprietary WiFi signal, or is it something that works differently?

Tags: wifi, WiGig |
2 Answers |
murph
3 weeks ago
No description for the question.
Tags: email, list servers |
3 Answers |
MrsMith
4 weeks ago

I see that Nest has reintroduced Nest Protect, the smart smoke detector that is a part of the Nest “smart home” system with everything interconnected for...

Tags: Nest, Nest Protect |
2 Answers |
PaxProSe
4 weeks ago

One of my friends has her small business’s wireless network secured with WEP encryption. I’ve suggested that she should change to WPA/WPA2 and advised her...

4 Answers |
jackson
5 weeks ago

Apparently Comcast has decided to piggyback public hotspots onto their customers’ private wireless routers. I have no desire for my router to become a...

2 Answers |
Financial institutions use many technologies to fight crime, but much of the work comes too late, focusing on suspicious activity, like uncharacteristic charges or money transfers, after it happens.
A bill that allows consumers to unlock their cellphones for use on other carriers passed its last hurdle in Congress on Friday, opening the way for it to become law once it is signed by President Barack Obama.
California is moving its IT services to a cloud, on-demand, subscription-based service that state officials believe may meet as much as 80% of its computing needs.
The U.S. Securities and Exchange Commission has dropped its investigation into disclosures about Facebook advertising sales before the company went public in 2012.
Be sure to show your sysadmin how much you appreciate him or her today - but keep it sane
A method for tracking users across the Internet called "canvas fingerprinting" is simple to stop, but average Internet users may not know how to do it.
Chinese search giant Baidu reported a 34 percent jump in profit for the second quarter, with mobile ad sales accounting for almost a third of revenue for the first time.
The expected boom in demand for small, often isolated devices in the Internet of Things is driving developers to craft new types of components.
Wi-Fi technology continues to evolve as wireless devices proliferate and demand for video and other data explodes.
Microsoft disclosed on Monday that it's working on Project Adam, a platform for interpreting what a phone or computer "sees." The initiative is designed to help the company's digital assistant, Cortana, to better understand the world around her.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+