Gateway Computers

Showing results 1 to 20 of 3,910

Will your Mac run OS X 10.10 Yosemite?

Summary: Here's a list of the oldest Apple hardware capable of running the new OS X 10.10 Yosemite operating system. If you have this hardware (or better) then you're good to go.

October 17, 2014 by Adrian Kingsley-Hughes

USB security for a BYOD environment

Summary: BYOD is a double-edged sword for corporations. But the latest USB security blunder to surface is going to cause some real headaches. Here's how to protect yourself.

October 8, 2014 by Adrian Kingsley-Hughes

Shellshock: How to protect your Unix, Linux and Mac servers

Summary: The Unix/Linux Bash security hole can be deadly to your servers. Here's what you need to worry about, how to see if you can be attacked, and what to do if your shields are down.

September 26, 2014 by Steven J. Vaughan-Nichols

Unix/Linux Bash: Critical security hole uncovered

Summary: The popular Linux and Unix shell has a serious security problem that means real trouble for many web servers. Fortunately, a patch -- as source code -- is available.

September 24, 2014 by Steven J. Vaughan-Nichols

ACMA and Comms Department plan shared services

Summary: The ACMA and the Department of Communications look set to move to shared IT and finance services as early as November this year, ZDNet can reveal.

September 17, 2014 by Josh Taylor

The state of IT jobs in the US

Summary: What are the significant trends in the US IT job market, and which jobs are likely to be 'hot' in the future?

September 2, 2014 by By Mary Shacklett | September 2, 2014 -- 14:27 GMT (07:27 PDT)

The IBM PC: Was it really only 33 years ago?

Summary: It might seem to some that the IBM PC was invented aeons ago, but for me it seems like happened only yesterday and my, it was exciting.

August 12, 2014 by Colin Barker

IBM buys cloud security provider Lighthouse

Summary: IBM plans to integrate the businesses of Lighthouse and CrossIdeas with IBM's current IAM offering, with the goal of building out a full suite of identity-focused security software...

August 11, 2014 by Natalie Gagliordi

BadUSB: Big, bad USB security problems ahead

Summary: Everyone knows that USB thumb-drives can spell security trouble, but a German security group has found new and nasty ways to use USB devices to wreak havoc on computers.

July 31, 2014 by Steven J. Vaughan-Nichols

Hands-on with Amazon's Fire Phone: Gimmicks over purpose

Summary: The Fire Phone has one flagship feature: a display with three-dimensional aspects. Other software elements in the retail giant's debut smartphone are gimmicky at best. This device...

July 28, 2014 by Zack Whittaker

How did Macs defy the PC sales slump?

Summary: Just as the iPod became a gateway drug for the iPhone, which itself became the gateway drug for the iPad, iOS is set to become the platform that tempts people into the OS X ecosystem.

July 24, 2014 by Adrian Kingsley-Hughes