The new Python 3 programming language for iPad, iPhone and iPod touch. Programming language is a perfect tool for studying, complex...
Showing results 1 to 20 of 64
SK Telecom, KT and LG Uplus release joint integrated platform, which touts the ability to allow users to message, call and send files to other subscribers regardless of network or device.
Yammer acquires oneDrum, giving the enterprise social network even more collaboration tools and support for Google Docs and Microsoft Office files.
The network equipment provider is looking to block Nokia Siemens' buy of Motorola's wireless network business, claiming violation of the company's intellectual property
Rackspace and Akamai have entered into a strategic relationship to add content delivery network technology and other Akamai services into the hosting company's products, including Cloud Files
Apple today warned that opening or viewing image files could lead to remote code execution attacks against Mac OS X users.In an update that contains fixes for a total of 19 documented vulnerabilities, Apple said malicious hackers could rig PNG (Portable Network Graphics) and other images to take complete control of unpatched Mac systems.
The classic Objective-C programming language for iPad, iPhone and iPod touch. Programming language is a perfect tool for studying,...
The company has come up with an idea for an encrypted communications network that could prove useful for businesses that want to keep files confidential
If you work in IT, there's probably nothing scarier than the thought of giving some mid-level manager access to the network logs and files. At the same time, who hasn't wanted to tell that same mid-level manager to "Look it up yourself" when he comes trotting down to the basement to get you to drop your world for his request?
The classic Pascal programming language for iPad, iPhone and iPod touch. Programming language is a perfect tool for studying, complex...
Just like Windows and Linux, the Cisco IOS has its own list of commands to manipulate files, and it’s critical for Cisco network administrators to be very familiar with them. In this video, Bill Detwiler goes over some basic Cisco file commands and show you how they can help you keep your network running smoothly.
Datto is hoping its new twist on network attached storage (NAS) can stand out amid an increasingly crowded field of competitors. The Box 2 Box device, due in March, is designed to create a peer-to-peer network with other Box 2 Box drives, letting you sync files between the two, even if they're not using the same home network.
A good friend of mine from a university in north-west England got an email through from their network administrators at the end of last week, basically saying,"...every time you plug in your flash drive, we see it offloading a whole load of malicious files to the computer you're working on, and therefore impacting our network...
The battle to be the top network hard drive solution for home networks continues with Iomega's latest salvo. The new StorCenter ix2 NAS device adds a new wrinkle with its Bluetooth supportallowing you to transfer files from a cell phoneand implements more software from parent company EMC.
The rumors that T-Mobile may launch a Google Android device in September seem more and more plausible now with the details that Engadget found in the latest FCC documents (PDF files). This FCC approval is for the rumored HTC Dream device. The operating system is not mentioned in the FCC documents so it is possible this device could be a Windows Mobile device too. Either way, it looks like this may be T-Mobile USA's first high end device that supports their 1700 MHz 3G network. The FCC documents reveal it has WiFi, Bluetooth, and T-Mobile 3G support.
In this IT Dojo video, Bill Detwiler shows you a simple monitoring solution that uses Windows Server 2003 Group Policy.Before watching the video, you should realize this tip isn't right for every situation. This method uses Windows XP and Internet Explorer's local browsing history. To view the history files, you must physically visit each machine, remotely access the machine, or copy the files to a network location with a script. Furthermore, a sophisticated end-user could easily navigate to and delete the browser history. This monitoring technique is best suited when monitoring a small number of users, or better yet, a single, problem user.
As I noted in the first installment of this series, some of my favorite productivity-enhancing techniques don’t involve custom code or registry edits. Instead, they involve learning how the basic building blocks of Windows work, and then rearranging those components to cut steps out of the tasks you perform most often. In today’s installment of this two-part series, I share some of my favorite tweaks for getting maximum mileage out of Windows Search. I also explain the inner workings of volume shadow copies and how you can make better use of these automatic backups with System Restore and the Previous Versions feature. I show how to get quick access to your local and network data files by combining shortcuts in a single, easy-to-reach location, and I explain why hybrid sleep should be the default on every desktop PC.
Hollywood would have IT pros believe that the biggest threat to network security comes from international super hackers or high school kids trying to download games like global thermonuclear war. In reality, we face a more mundane threat--our end users, particularly those wielding USB storage devices.These pocket-sized devices can store a large amount of data. But even if your users aren't planning to cart off sensitive company files, USB storage devices (external hard drives, camera, memory stick, MP3 players, etc.) can be a headache in other ways. Employees may use your networks to download music to their USB-based MP3 players. New USB flash drives, such as SanDisk's U3 smart drives, can even run software directly from the device--a perfect tool for the end-user who wants to run unauthorized software on your network.If your concerned about USB storage devices on your network and don’t feel a written policy alone will protect your data, disabling the devices is your next step.In this IT Dojo video, Bill Detwiler, TechRepublic's Head Technology Editor, shows you how to disable USB storage devices on both Apple OS X and Windows. The United States National Security Agency (NSA) described the process in a March 2008 document from the agency's Information Assurance Directorate.Once you've watched this IT Dojo video, you can read the original TechRepublic article, download PDF version of this tip, and learn more about mitigating the risks poses by USB storage devices from our IT Dojo blog.
In a filing with the FCC yesterday, Comcast admits it messes with certain "P2P protocols."Plain English: When Comcast subscribers are exchanging large files- Comcast sees these as poential factors in slowing down its network, and reserves the right to employ digital chicanery to interrrupt these sessions.
Netgear's SC101T Storage Central Turbo is robust, relatively attractive and affordable, making it suitable for all but the most demanding environments, although managing the device can be tricky.
Playing music while transferring files across a network severely impacts performance.
The ZyWALL SSL 10 would suit a small organisation that just wants general remote network access at a low price.
Could we be seeing the future of Google with the newly announced iTV from Apple? It's not hard to imagine a Gapple iTV that that would not only allow you to consume media files on your home theater system, but also stream television content and display relevant advertisements from Google -- especially since this device requires a network to do anything useful.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)