How to display a wallpaper behind the text in a Word doc?
Ask a question
Oracle is fleshing out its family of cloud applications and taking a competitive step against the likes of Salesforce.com with the acquisition of TOA Technologies, maker of software for companies centered around field services. Terms were not disclosed.
Microsoft's Xbox One is poised to be the first foreign game console to debut in China, but as the local pricing was announced on Wednesday -- $200 more than in the U.S. -- would-be customers made their displeasure known online.
Linux’s creator goes on another epic rant
There's no immediate end in sight to trouble that has hit the U.S. State Department's computer system for processing visa applications and caused problems for thousands of people worldwide.
Red Hat has developed a version of the Linux operating system that can be used to test chips and associated hardware based on the ARMv8-A 64-bit architecture for servers with the aim of standardizing that market.
Deploying an enterprise resource planning (ERP) system is an expensive proposition, not just in terms of licensing dollars (SLA) and maintenance, but in terms of dedicated resources and time. And yet all too often, organizations, dazzled by vendor promises and hype -- Deploy our ERP software and your manufacturing business will instantly run smoother and increase profits! -- fail to come up with a viable long-term (or even short-term) roadmap.
A U.S. appeals court has dismissed a long-running patent infringement lawsuit lodged against Lawson Software by ePlus.
Microsoft's voice-activated digital assistant Cortana is coming to China in a beta version nicknamed "Xiao Na", as part of several new functions packed into a Windows Phone 8.1 update.
In response to a query from Vint Cerf, professional developers explain why they don’t feel a membership in the Association for Computing Machinery is worth the cost
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.