NetworkingNetworking also in this channel
Chief information security officers (CISOs) continue to have a hard time gaining the respect of other C-suite executives despite the heightened focus overall on information security. read more »
Mobile carriers have pulled in hundreds of millions in profits through third-party charges tacked onto customers' bills without their consent, according to a report from a U.S. Senate committee. read more »
Early one morning in April last year, someone accessed an underground vault just south of San Jose, California, and cut through fiber-optic cables there. The incident blacked out phone, Internet and 911 service for thousands of people in Silicon Valley. read more »
U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agency's bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year. read more »
A network testbed being constructed just south of San Francisco will help carriers and vendors develop standards for better cloud services, the CloudEthernet Forum says. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
You've heard the term and probably read stories about smart homes where the toaster talks to the smoke detector. But what makes it all connect? When will it become mainstream, will it work and what does it mean for IT porfessionals? These frequently asked questions help explain it all. read more »
Though you may know and follow basic security measures on your own when installing and managing your network and websites, you'll never be able to keep up with and catch all the vulnerabilities by yourself. read more »
In only nine years Infiniti Red Bull Racing has managed to go from being the ‘fun underdog’ of Formula 1, to a team that is taking on companies that have been making cars for decades – and is frequently beating them to the top of the podium. read more »
A mentor and mentee explain what they have gained from their company's mentorship program. read more »
For generations, office ergonomics involved various measures intended to keep employees productive while they remained in their chairs. New thinking and new devices are changing all that. read more »more in depth ..
Most Popular in Networking
IT services and mobile connectivity will be charged on a per-seat basis
Communications are independent of cellular networks
The previous update detailed the massive rejection of ISDS in TTIP, even at the highest political levels in Europe. That refusal to allow corporations to be placed above national law has now spread to the other major trade agreement that...read more »
Gaining control of privacy is not going to be easyread more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.