Is Conficker Actually "Dangerous"?
A new book, titled Worm, seeks to give the complicated story of one of the biggest computer worms in existence. While Conficker is an interesting …
Continue ReadingA new book, titled Worm, seeks to give the complicated story of one of the biggest computer worms in existence. While Conficker is an interesting …
Continue ReadingWith the explosion in variety of tablet computers over the past year, is the Android-based Lenovo IdeaPad K1 just another “me too” device? …
Continue ReadingIf you’re using an Apple Mac, there is nothing forcing you to use Microsoft Office products when you have the choice of a perfectly good …
Continue ReadingOrganizations have a responsibility to protect the data of their customers, employees or other stakeholders. Many must comply with industry …
Continue ReadingToshiba has jumped into the tablet world. They’ve now released the Toshiba Thrive 7 Tablet. A good tablet, but is it good enough to be worth …
Continue ReadingAre you an I.T. professional who uses Kaseya to manage your network? Are you the go-to person for questions about Kaseya? Brush up on your knowledge …
Continue ReadingFor years, the MS Office suite has dominated the office software scene. Currently it does not seem that this will change much, but nonetheless there …
Continue ReadingUnderstanding Open Source licenses is not as easy as you may think. As a matter of fact, there are a lot of bells and whistles that a potential …
Continue ReadingComputer viruses have come a long way since they were first thought of. Moving from the realms of a simple practical joke, to the high heights of …
Continue ReadingThere have been a lot of questions raised over just who is going to pick up the torch after Jobs’ passing. It seems unlikely that anyone could …
Continue ReadingWe all know that Apple and Sony make cool hardware, but why does Microsoft always struggle with getting the approval of the technorati and …
Continue ReadingIntegrating Skype into Windows 8 looks like a key aspect of Microsoft’s purchase of the voice over IP service and after avoiding the attention …
Continue Reading