RSS

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a question

Join Now or Sign In to ask a question.
helenamy
3 hours ago

I've got a password protected pdf file from my boss, I need to open and edit it. Anyone know how to remove the password of it?

PaxProSe
3 hours ago

I got a flyer from my company’s insurance broker advertising "cyber insurance" today. I didn’t realize this was a product that existed. At first I just...

JOiseau
4 hours ago

This week Facebook rolled out “Nearby Friends” a new location sharing feature. I don’t need to share with everyone where I am all the time, and I don’t want...

ttopp
4 hours ago

When I’m using open WiFi networks for anything more than a quick bit of casual browsing, what steps are necessary to stay secure?

owen
4 hours ago

I was a little surprised to see Microsoft Word on the Chrome Web Store. Since Office Online is already cloud based, and Word on Chrome will be cloud based,...

MGaluzzi
9 hours ago

The options for protecting against DDoS attacks basically comes down to a hardware based or cloud based solution. Hardware is the traditional way and if...

SilverHawk
9 hours ago

After years of the wireless industry arguing against having kill switches in smartphones and opposing regulations that would mandate it, there was an...

blackdog
9 hours ago

Lately, every time I start Firefox I get a message that says “you’ve been updated to the latest version of Firefox.” I know that Firefox updates...

Josh Garrett
1 day ago

I am in my 30's, and I want to start a new career. My questions are intentionally broad, since I want to get several viewpoints as to what my options are. I...

dayzsunny
1 day ago

I’m a little confused about VoIP telephony terminology, specifically the term “SIP Trunking.”. Is SIP Trunking just another way to say VoIP, or does it...

Tags: sip trunking, voip |
1 Answer |
Almost 500,000 patient records have been hacked from the servers of the Harley Medical Group, the plastic surgery firm which has clinics across the UK.
The U.S. Federal Communications Commission will reserve a significant amount of spectrum in its upcoming auctions of the television band for unlicensed uses such as Wi-Fi, agency officials said Friday.
Can plastic materials morph into computers? A research breakthrough published this week brings such a possibility closer to reality.
Even four months after the Mac Pro's initial release, Apple appears to be having problems making enough of the high-end cylindrical desktop computer. The company's store currently shows shipping times of 4-5 weeks for all Mac Pro models, even the stock versions without additional customizations.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
Vendors will tell you that the Internet of Things (IoT) has arrived. We're here to tell you that it hasn't.
Those predicting the doom of Android because of the iPhone 6 are quite wrong. Plus: Take a screenshot tour of Ubuntu 14.04 LTS, and does Linux disappoint some Windows users?
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
Twitter's new mobile advertising suite lets companies pitch their mobile apps in promoted tweets or place ads inside other apps.
Sure, you’ve changed a bunch of passwords, but are you doing all you can to protect yourself?
Today's question
What are my options for cloud-based IT service management software?

Answer this question now!
Submitted by afinch

White Papers & Webcasts

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+