Google is drawing from the work of the open-source community to offer its cloud customers a service to better manage their clusters of virtual Read More
7 cool uses of beacons you may not expect Beacons are a useful new twist on location awareness, tying a unique ID to a small device that apps can Read More
Rules designed to thwart man-in-the-middle attacks; could mean extra work for IT shops Public certificate authorities (CAs) are warning that as of Read More
Anyone who works with technology knows that at some point or another, all computers behave as if they are evil supercomputers. But in the annals of Read More
Aligning IT with the business has been a top priority of IT organizations for the past few years, but that is changing, according to the latest State Read More
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. SQL injection attacks have been around for more Read More
The Internet of Things is growing, and the things are getting weirder by the day. Last year, we dug up some of the weirdest objects that had been Read More
The more languages it learns, the better it becomes at the ones it learned first, but no one knows why Speech-to-speech translation technology Read More
I like the IBM Edge conference because it tries to showcase how infrastructure can provide a large company with a competitive edge. While the event Read More
Test network devices, track trouble tickets, remote control PCs, deploy phone apps, more IT pros who carry a Windows Phone already know it can be Read More
Just because BYOD has become normal operating process in most workplaces doesn't mean the practice has stopped up causing dispute for IT. Take San Read More
Successor likely to ship in October OS X Mavericks powered half of all Macs that went online in March, the largest percentage of any individual Read More
NSS Labs recently released the results and analysis from its latest Browser Security Comparative Analysis Report, which evaluated the ability of Read More