Dropbox lets you bring all your photos, docs, and videos anywhere and share them easily. Access any file you save to your Dropbox from...
Showing results 1 to 20 of 103
Arista said it has experienced rapid revenue growth over the last several years, turning profits each fiscal year since 2010 and boasting an 86 percent revenue growth in 2013.
SK Telecom, KT and LG Uplus release joint integrated platform, which touts the ability to allow users to message, call and send files to other subscribers regardless of network or device.
The next version of OneFS, code named Mavericks, drastically cuts access times as well as adding data protection and recovery features to complement the Isilon storage OS
Yammer acquires oneDrum, giving the enterprise social network even more collaboration tools and support for Google Docs and Microsoft Office files.
The rights of web businesses and users trump those of copyright holders when it comes to filtering content, the ECJ has found
Top 30 in France, Italy, Switzerland, Japan, Thailand, Luxembourg, Poland, Egypt, Indonesia, Spain, India, Tunisia, Honduras, Ecuador,...
The network equipment provider is looking to block Nokia Siemens' buy of Motorola's wireless network business, claiming violation of the company's intellectual property
Rackspace and Akamai have entered into a strategic relationship to add content delivery network technology and other Akamai services into the hosting company's products, including Cloud Files
Fast, lightweight and easy to use file manager. Simple, with a smooth intuitive interface, Explorer is perfect for organizing your...
By protecting sectional business interests, the government will have shot itself in the digital-inclusion foot, says Malcolm Corbett
Apple today warned that opening or viewing image files could lead to remote code execution attacks against Mac OS X users.In an update that contains fixes for a total of 19 documented vulnerabilities, Apple said malicious hackers could rig PNG (Portable Network Graphics) and other images to take complete control of unpatched Mac systems.
The company has come up with an idea for an encrypted communications network that could prove useful for businesses that want to keep files confidential
If you work in IT, there's probably nothing scarier than the thought of giving some mid-level manager access to the network logs and files. At the same time, who hasn't wanted to tell that same mid-level manager to "Look it up yourself" when he comes trotting down to the basement to get you to drop your world for his request?
For sharing media files and other documents on a home network, the DNS-343 would be fine. For business use, the awkward permissions system makes management more difficult than it needs to be.
Just like Windows and Linux, the Cisco IOS has its own list of commands to manipulate files, and it’s critical for Cisco network administrators to be very familiar with them. In this video, Bill Detwiler goes over some basic Cisco file commands and show you how they can help you keep your network running smoothly.
Datto is hoping its new twist on network attached storage (NAS) can stand out amid an increasingly crowded field of competitors. The Box 2 Box device, due in March, is designed to create a peer-to-peer network with other Box 2 Box drives, letting you sync files between the two, even if they're not using the same home network.
A good friend of mine from a university in north-west England got an email through from their network administrators at the end of last week, basically saying,"...every time you plug in your flash drive, we see it offloading a whole load of malicious files to the computer you're working on, and therefore impacting our network...
The battle to be the top network hard drive solution for home networks continues with Iomega's latest salvo. The new StorCenter ix2 NAS device adds a new wrinkle with its Bluetooth supportallowing you to transfer files from a cell phoneand implements more software from parent company EMC.
The rumors that T-Mobile may launch a Google Android device in September seem more and more plausible now with the details that Engadget found in the latest FCC documents (PDF files). This FCC approval is for the rumored HTC Dream device. The operating system is not mentioned in the FCC documents so it is possible this device could be a Windows Mobile device too. Either way, it looks like this may be T-Mobile USA's first high end device that supports their 1700 MHz 3G network. The FCC documents reveal it has WiFi, Bluetooth, and T-Mobile 3G support.
In this IT Dojo video, Bill Detwiler shows you a simple monitoring solution that uses Windows Server 2003 Group Policy.Before watching the video, you should realize this tip isn't right for every situation. This method uses Windows XP and Internet Explorer's local browsing history. To view the history files, you must physically visit each machine, remotely access the machine, or copy the files to a network location with a script. Furthermore, a sophisticated end-user could easily navigate to and delete the browser history. This monitoring technique is best suited when monitoring a small number of users, or better yet, a single, problem user.
As I noted in the first installment of this series, some of my favorite productivity-enhancing techniques don’t involve custom code or registry edits. Instead, they involve learning how the basic building blocks of Windows work, and then rearranging those components to cut steps out of the tasks you perform most often. In today’s installment of this two-part series, I share some of my favorite tweaks for getting maximum mileage out of Windows Search. I also explain the inner workings of volume shadow copies and how you can make better use of these automatic backups with System Restore and the Previous Versions feature. I show how to get quick access to your local and network data files by combining shortcuts in a single, easy-to-reach location, and I explain why hybrid sleep should be the default on every desktop PC.
Hollywood would have IT pros believe that the biggest threat to network security comes from international super hackers or high school kids trying to download games like global thermonuclear war. In reality, we face a more mundane threat--our end users, particularly those wielding USB storage devices.These pocket-sized devices can store a large amount of data. But even if your users aren't planning to cart off sensitive company files, USB storage devices (external hard drives, camera, memory stick, MP3 players, etc.) can be a headache in other ways. Employees may use your networks to download music to their USB-based MP3 players. New USB flash drives, such as SanDisk's U3 smart drives, can even run software directly from the device--a perfect tool for the end-user who wants to run unauthorized software on your network.If your concerned about USB storage devices on your network and don’t feel a written policy alone will protect your data, disabling the devices is your next step.In this IT Dojo video, Bill Detwiler, TechRepublic's Head Technology Editor, shows you how to disable USB storage devices on both Apple OS X and Windows. The United States National Security Agency (NSA) described the process in a March 2008 document from the agency's Information Assurance Directorate.Once you've watched this IT Dojo video, you can read the original TechRepublic article, download PDF version of this tip, and learn more about mitigating the risks poses by USB storage devices from our IT Dojo blog.