RSS

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a question

Join Now or Sign In to ask a question.
Aryton
14 hours ago

How can I monitor which applications are using the network in OS X?

stephenb
14 hours ago

How do I make a .png image transparent using Photoshop?

AppDevGuy
20 hours ago

When does the registration period end for Google I/O, and does anyone know how much the fees are?

Tags: Google I/O |
2 Answers |
ernard
20 hours ago

I understand zero day to mean that there is a serious security issue, but I don’t know what it actually means. Where does the term “zero day” come from?

dvarian
20 hours ago

How much difference is there between the Office 365 Personal and Home Premium subscriptions? I have Home Premium now, I’m wondering if I should switch.

cchecca
20 hours ago

All of the recent security issues in the news makes me curious - How much are my personal details and information worth in real dollars? Is there an actual...

2 Answers |
stylor
20 hours ago

How can I stop media from automatically playing when I visit a website using Internet Explorer?

rcook12
20 hours ago

Are there any significant changes to Windows Phone with 8.1, or is it just an incremental update like Android 4.4.3?

dayzsunny
20 hours ago

I’m a little confused about VoIP telephony terminology, specifically the term “SIP Trunking.”. Is SIP Trunking just another way to say VoIP, or does it...

Tags: sip trunking, voip |
2 Answers |
SilverHawk
20 hours ago

After years of the wireless industry arguing against having kill switches in smartphones and opposing regulations that would mandate it, there was an...

2 Answers |
A cybercriminal operation that combines phone-based social engineering attacks with spear phishing and malware to steal money from organizations has resurfaced this year, finding victims in French-speaking countries in particular.
Enterprise workloads are shifting to cloud and hosting environments in ever greater numbers and attacks that have historically targeted on-premises environments are following them, according to a new report.
Most unaware of, uninterested in, or hostile to mobile tracking, paying.
Korean researchers have shown it's possible to wirelessly transmit power over a distance of 16 feet and charge up to 40 smartphones.
Scientists have created open source plant seeds to help farmers battle the corporate shop of seed horrors. Plus: The Linux Foundation launches the Core Infrastructure Initiative in the wake of the Heartbleed bug, and why Linux is a great replacement for Windows XP.
Driven by growth in mobile and Fios broadband customers, Verizon Communications on Thursday reported first quarter 2014 revenue of $30.8 billion, up from $29.4 billion a year earlier.
Reeling from the Heartbleed security fiasco, major IT vendors including Microsoft, IBM, Intel, Google and Cisco are backing a Linux Foundation initiative designed to boost open source projects considered critical to the industry.
Salesforce.com was so impressed by the Mayday customer support feature that Amazon.com rolled out for its Kindle Fire HDX tablets that it's now working to create its own version.
Despite its setbacks in the U.S., Huawei Technologies still expects growth from its carrier business in the nation, and is focusing on the market's smaller network operators to increase sales.
Nokia's ongoing tax dispute with Indian authorities has put an end to its plans to transfer a local smartphone factory over to Microsoft, as the software maker finalizes its takeover of the Finnish company's devices and services business..
Today's question
What are my options for cloud-based IT service management software?

Answer this question now!
Submitted by afinch
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+