SMB

SMB news, trend analysis and opinion


Hero hacks: 14 Raspberry Pi projects primed for IT

VoIP PBXes, NTP servers, Web-controlled power strips -- hack together one of these handy, cheap solutions for the server closet and beyond

First look: Android L in action

The new Android version comes with a UI refresh, not new features alone

BrandPost Brocade

Internet of Overwhelming Things

As the era of Internet of Things (IoT) dawned, the fridge got hacked. Well, maybe not.

Gadgets galore: 8 digital products from CE Week

CE Week, a New York City-based exhibition from the same folks who bring you the huge CES show in Las Vegas, attracts vendors who are showing new, innovative or just-plain-weird products. Here is a sampling of what we saw.

10 tech support requests you never want to hear from your family

Image by Archiboldian licensed under CC BY 2.0If you’re a techie it’s likely that someone in your family will ask you a question about their cell phone, their computer, their iPad, their you-name-it … and not long after the whole

Watch out for these smartwatches

With Apple expected to launch an iWatch in October, other vendors including Samsung, LG and Motorola, are getting a headstart with smartwatches in varied shapes and colors.

15 Chrome OS productivity apps that work offline

Chromebooks are lightweight, inexpensive and efficient -- in other words, great for business travel. But can these cloud-based laptops operate when you're off Wi-Fi? Sure they can -- here are 15 productivity apps that can work with...

BrandPost Brocade

Against All Odds

No doubt, there are consumers of data center services who share my despair over getting access to the unrestricted wonders enabled by ongoing innovations in social, mobile, cloud and big data. IDC has dubbed those innovations

10 Microsoft Power BI for Office 365 Success Stories

Organizations around the world are unlocking business intelligence with the cloud-based Microsoft Power BI for Office 365 service. Here are 10 examples of its success in the real-world.

Biggest, baddest, boldest software backdoors of all time

These 12 historically insidious backdoors will have you wondering what’s in your software -- and who can control it

Put your NFC-enabled smartphone to work

As NFC proliferates on new smartphones, we're entering the era of touch-and-go business.

Six Docker services making serious waves

Docker is primed to take IT by storm -- and here are six new services to make the most of the open source app-container technology

The 2014 Software Defined Netwoking (SDN) Challenge

The key to supporting server virtualization. Which SDN solutions are up to the task of creating more nimble network?

10 great new features in Microsoft Azure

Microsoft woos customers to the cloud with a slew of new networking, security, storage, DR, management, and orchestration capabilities

Asus adds 'laptop' to the shapes its Transformer phone-tablet hybrid can adopt

Taiwanese PC maker Asus has added laptop to the forms that its latest Transformer phone-tablet hybrid can adopt -- potentially taunting Microsoft and Google once again with the device's ability to run both Windows and Android.

Gigabyte puts 3200 by 1800 '3K' screen on 13.9-inch gaming laptop

Taiwan's Gigabyte is fitting a 3200 by 1800 screen on its latest gaming laptop, making it among the growing number of vendors adding so-called "3K" displays to their PC products.

Samsung introduces Tizen smartphone, with a Tizen TV next year

Samsung introduced Monday its first smartphone built around the Tizen operating system, with a TV running the OS planned for next year.

Comprehensive Advanced Threat Defense

The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-­based approach to Advanced Threat Defense.

ARM developing processors to make wearables 'invisible'

In the gold rush for wearables, the key to success is invisibility and long battery life. ARM is pursuing the development of tiny processors that fit the profile.

Backlash over Facebook's 'listening' feature is a problem of trust

Facebook will soon be listening to its users -- literally -- but some of them wish it would cover its ears.

10 Google Glass Etiquette Dos and Don'ts

There's not necessarily a right or wrong way to use Google Glass, but there are certainly smart and not-so-smart ways. CIO.com's own Glass Explorer Al Sacco shares 10 Glass etiquette dos and don'ts.

New attack methods can 'brick' systems, defeat Secure Boot, researchers say

The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.

Load More