Featured Stories

Latest Articles

Cloud Data Storage Policy

The rise of third-party cloud-based file storage applications has brought flexibility and ease of data access to users and businesses alike. Commonly-used applications such as Dropbox, OneDrive and Google...

from TechProResearch »

​NSW iVote vulnerability 'overstated'

​NSW iVote vulnerability 'overstated'

Researchers' claims that the New South Wales online iVote system was vulnerable to a FREAK attack have been overstated, according to the state's Electoral Commission, which has questioned the researchers' motives.

published 3 days ago by

Comments

The 11 best high-performance storage devices

The 11 best high-performance storage devices

While the cloud has appeared just in time to offer free (or at least cheap) and easy access to gigabytes of storage space, some people like to keep their data close to hand. Here are some of the best storage devices money can buy that will help you keep your data safe.

published February 4, 2015 by

Comments

Cloud Data Storage Policy

The rise of third-party cloud-based file storage applications has brought flexibility and ease of data access to users and businesses alike. Commonly-used applications such as Dropbox, OneDrive and Google...

from TechProResearch »

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories

Latest Blog Posts

Photo Galleries