RSS

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a question

Join Now or Sign In to ask a question.
ttopp
49 min ago

Sometimes app updates make changes that I don’t really like. Occasionally, an update will actually break the app and make it unusable. Usually the major...

jpbwana
2 hours ago

I was trying to download an app called 'hotels tonight' and it replied that it can't be downloaded without ios 7.0 or higher. Please help me as I know very...

1 Answer |
aiden
3 hours ago

The latest Android vulnerability has been called Fake ID, and as I understand it fools the OS by pretending to be a different app. How does it do that, and...

dvarian
5 hours ago

I’m showing some works at art fairs and usually sell a piece or two each time. I’ve only been able to take cash or checks, which has cost me some sales, so...

Aryton
6 hours ago

What are the big differences between Yosemite and previous versions of OS X? Anything exciting to look forward to?

david8789
10 hours ago

I have recently been to paris and taken over 300 photos on a sony hx50. The night before flying home i took a photo and the camera brought a message up...

stylor
12 hours ago

Is it possible to root Android Wear in the same way you can other Android devices?

Tags: Android Wear, root |
1 Answer |
jackson
12 hours ago

There is an HBO documentary called Love Child that I’ve got on my “to see” list. It’s pretty tragic; basically two people who are “internet addicts” meet,...

2 Answers |
tswayne
1 day ago

Can I mirror the entire display on my Android phone to my Chromecast the same way I do when casting a Chrome browser tab? Of course, I realize that some...

MGaluzzi
2 days ago

Due to recent court decisions, the FCC is limited in the oversight and restrictions it can impose on ISPs. It has been argued that the only way the FCC can...

1 Answer |
Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company.
Twitter more than doubled its sales in the second quarter, the company reported Tuesday, showing a strong advertising business.
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- the killer feature for the enterprise.
Early one morning in April last year, someone accessed an underground vault just south of San Jose, California, and cut through fiber-optic cables there. The incident blacked out phone, Internet and 911 service for thousands of people in Silicon Valley.
Oracle has responded to a former employee's claim that a new in-memory processing option is turned on by default with the latest release of Database 12c, insisting that the process of enabling it requires a series of deliberate steps.
New Dynamic Perspective sensors help boost cost, though display costs are minimal, IHS says.
Today's hotels are unfortunately vulnerable to types of attempted fraud. Here's how to keep data safe when you travel.
On the positive side, with the influx of cheap solar cells, the U.S. will be able to achieve its six-gigawatt installation goal this year.
Uber and Airbnb, which have already proved popular with travelers and urbanites with smartphones, have unveiled new features and links to other services designed to attract more business users.
Audi demonstrated a highly automated driving technology in an Audi A7 equipped to handle driving functions on freeway conditions at up to 40 mph.
Today's question
How prevalent is 'private power generation' for data centers becoming?

Answer this question now!
Submitted by nrichmond
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness