The flaws can be exploited to gain unauthorized access or cause denial-of-service conditions read more »
Residents of a dorm can name their own networks and set policies while sharing access points read more »
Attackers have used a variety of techniques to exploit known vulnerabilities in router models from different manufacturers read more »
The upgraded app adopts the product's new name -- OneDrive for Business -- and adds other enhancements read more »
The first step, in-car wireless infotainment systems, set for mass rollouts this year; experts say extending that to smart highways is a massive task read more »
Researchers have developed tag-based software to control who can see your files read more »more news ..
LAN Blogsmore blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
LAN In Depth
How many devices do you have on your home Wi-Fi? That many? Here are some strategies for optimizing your wireless performance. read more »
The real story of Windows 8 is that Microsoft has created an unmatched system for running virtualised environments read more »
Overall adoption has been sluggish, perhaps due to competition from Google Apps read more »
Organisations can optimise their approach to public cloud security by deciding how mission critical an application is read more »
Study finds as much as 30% of IT spending being done by business units outside the official IT budget read more »
HTML5 and RIM's larger development strategy will come into sharp focus at BlackBerry World in Orlando read more »more in depth ..
Easing your test, deployment and management headaches read more »
From geronimo to Tomcat to Hadoop read more »
Here are some of the best-known free security tools you can try inside your own network read more »
Stellar industrial design distinguishes 25 red dot award-winning IT and communications products read more »more slideshows ..
Maximise the effectiveness of collaboration read more »
Help you with your selection process read more »more white papers ..