Complaints continue to pour in from users whose Wi-Fi is malfunctioning after upgrading to the new Mac OS X version read more »
One of the largest suppliers of automotive chips for in-vehicle electronics announced a new Ethernet board and software that will connect instrument clusters, infotainment systems, cameras and sensors over 100Mbps Ethernet. read more »
After days of critical scrutiny on social media networks, the wireless router that was supposedly a custom-built Tor privacy engine has been suspended by Kickstarter after raising nearly $600,000 in only a few days. read more »
The company's platform lets service providers offer virtual router and firewalls read more »
Both companies stand to gain if network functions virtualization upends traditional carrier systems read more »
A Kickstarter project for a wireless router that automatically encrypts data and sends it through the Tor network is approaching 10 times its fundraising goal after just one day. read more »more news ..
When home security requires levels of expertise found in an SME, BYOD poses problems read more »
FOSDEM is the most important meeting ground for the world's open source developers, and you can attend free of charge. Will you be there? read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Router In Depth
How techies can bring data mishandling and abuses to light without putting their careers in jeopardy. read more »
Ocado Technology's COO explains why it, and other companies, should help bridge the technology gender gap read more »
Automation is a logical next step in the SDN migration journey. read more »
Develop a security baseline and measure systems against the baseline read more »
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »
Windows 8 adds even more features to increase productivity and remain compliant read more »more in depth ..
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Microsoft leads the way, but has plenty of company on jobs cut front read more »
Projects hoping for financial backing include wind and solar chargers, drones and a panoramic video camera read more »
The Internet of Things is changing simple homes into smart homes, where everything from your lights to your locks can be controlled from your smartphone. Here are a few products that can help you get started. read more »more slideshows ..
Maximise the effectiveness of collaboration read more »
Network Design: Needs to be Consolidated and Flexible read more »more white papers ..