Hewlett-Packard and Samsung Electronics will now ensure that their PCs in China are installed with licensed Windows and Office software as part of new agreements signed with Microsoft meant to fight piracy.
A Dell special committee has rejected a new proposal from a key shareholder Carl C. Icahn, and said it will continue to support the proposal by founder Michael Dell and private-equity firm Silver Lake Partners to take the company private.
Internet tools are just starting to be applied to industrial tasks such as maintaining equipment and optimizing operations, but the wealth of data being produced by industrial systems could make this a major focus of development in the coming years.
Google has asked the court overseeing terrorism-related surveillance programs at the U.S. National Security Agency to allow the company to publish information on the number of surveillance requests it receives.
An email composed, but never sent, by former Apple CEO Steve Jobs may prove instrumental in the Justice Department's case that Apple, along with the five largest book publishers, colluded to fix prices for electronic books.
The shift toward smaller tablets will accelerate in the second half of the year when a slew of tablet makers, including Apple, introduce new models with screens 8-in. or smaller, said Richard Shim, an analyst with DisplaySearch.
The National Security Agency is creating new processes aimed at making it harder for systems administrators to misuse privileged access to agency systems, NSA officials told the U.S. House Intelligence Committee Tuesday.
The attorneys general of several states are turning up the heat on Google, concerned that the search engine giant makes it easier for criminals to sell illegal drugs online, engage in human trafficking and peddle pirated intellectual property.
Thomas P. Jackson, the former federal judge who in 2000 ruled that Microsoft should be split into two companies, died Saturday. What if his ruling, overturned before it could be implemented, had gone into effect?
U.S. law enforcement agencies have disrupted more than 50 terrorist plots in the U.S. and other countries with the help of controversial surveillance efforts at the U.S. National Security Agency, government officials said Tuesday.
Canonical announced Tuesday that it has formed an advisory group of international wireless carriers – including big names like Deutsche Telekom and Korea Telecom, but excluding all of the big four U.S. networks.
Although the platform as a service (PaaS) market is smaller than both IaaS and SaaS segments of the cloud computing industry, research firm Forrester says this technology could be one of the most important cloud-based services for businesses moving forward.
The source code for the Carberp banking Trojan program is being offered for sale on the underground market at a very affordable price, which could result in additional Carberp-based financial malware being developed in the future, according to researchers from Russian cybercrime investigations firm Group-IB.
Huawei Technologies' much-leaked Ascend P6 smartphone is the world's thinnest at 6.18 millimeters, and has the highest-resolution front-facing camera at 5 megapixels, the company claimed at the phone's London launch.
Remember those 'Tastes great! Less filling!' beer ads? Many debate cloud computing in a similar manner, saying the cloud's great because it's either agile or inexpensive. As it turns out, cloud computing's affordability and agility aren't mutually exclusive--and that's good news for enterprise IT.
IT organizations and CIOs don't contract and outsource to countries, they contract and outsource to companies. Given that, it's time to stop assessing location-based risk in a vacuum because sometimes the 'riskiest' suppliers may have the most innovative solutions.
Jive Software is making a mobile push with new and enhanced mobile applications that have an emphasis on helping users of the enterprise social networking (ESN) suite create, not just view, content from their tablets and smartphones.
Start-up CrowdStrike today made available its first product, called Falcon, designed to detect and block stealthy infiltrations of Microsoft Windows or Apple Macintosh-based endpoint machines and servers.
Innovation has become a top concern for companies seeking a competitive edge in today's business world, especially as more organizations face new competitors that are using technology as a business disruptor.
Advanced Micro Devices is building its future server strategy around chips used in smartphones and tablets. The company said its first ARM server processors -- which will be released in the second half of next year -- will be faster and more powerful than its existing low-power x86 server processors.
The Open Data Center Alliance, a customer group that shares tips about cloud deployments and tries to nudge vendors into supplying the products they want, has added big data to the list of IT topics it covers.
NewsGator has upgraded its Social Sites enterprise social networking (ESN) add-on for SharePoint to make the software better able to tailor the content, notifications and capabilities it displays for each user.
Lean storage techniques will keep a lid on storage investments over the next few years, though the world's enterprises still are on track to buy 138 exabytes of storage system capacity in 2017, IDC said.
Apple didn't try to fix or raise the prices of electronic books when it entered into the market in 2010, according to Apple Senior Vice President Eddy Cue. Rather, he says, the company was only working to ensure a profit for itself.
Many attempts have been made over the last 46 years to rewrite Amdahl's law, a theory that focuses on performance relative to parallel and serial computing. One scientist hopes to prove that Amdahl's law can be surpassed, and that it doesn't apply in certain parallel computing models.
Many eyes in the tech world will fall on Oracle later this week, when the vendor's fourth-quarter results are set for release. This is typically the biggest reporting period for Oracle each year in terms of revenue, but a number of questions loom beyond its top-line performance.
Within just a few days of Apple unveiling iOS 7 at its annual Worldwide Developers Conference last week, a creative designer came out with a concept of what iPhone 6 might look like with the new software.
British intelligence agency Government Communications Headquarters (GCHQ) reportedly intercepted the electronic communications of foreign politicians during G20 meetings that took place in London in 2009.
When it comes to data breaches, hackers and organized crime garner most of the headlines, but most data breaches are caused by human errors and system glitches--application failures, inadvertent data dumps, logic errors in data transfer and more. As a result, educating your employees and making sure they're not cutting corners is a big component in preventing data breaches.
Google engineers are planning to test a system aimed at providing accessible Internet service to parts of the world with insufficient communications infrastructure – a collection of high-flying balloons equipped with specialized radios, dubbed Project Loon.
Analysts at the U.S. National Security Agency can gain access to the content of U.S. targets' phone calls and email messages without court orders, NSA leaker Edward Snowden said, contradicting denials from U.S. government sources.
As rumors of Apple's budget iPhone continue to circulate, the U.S. tech giant has been pushing sales of its older iPhone 4 model in China as a way to grab market share in the nation's mid-tier market, according to research firm IDC.
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
In a recent TekSystems survey, 1,500 IT leaders and 2,400 IT pros were polled on the importance of onboarding. When IT leaders were asked about onboarding's importance, the majority agreed that it's necessary but that many aren't doing it well.
Europe's top privacy watchdog and the Digital Agenda Commissioner both said Monday that more transparency and trust is needed between the European Union and the United States following the Prism scandal.
Wi-Fi is blossoming in the enterprise as organizations find new ways to leverage the wireless infrastructure and workers, having benefited from mobility, demand increased range and better performance (and support for all those devices they are bringing in from home). The industry is responding in kind, introducing new products and technologies, including gigabit Wi-Fi, and it is up to IT to bring it orchestrate this new mobile symphony.
Nearly three-dozen computer scientists have signed off on a court brief opposing Oracle's effort to copyright its Java APIs, a move they say would hold back the computer industry and deny affordable technology to end users.
As enterprises implement BYOD initiatives, IT managers have some key decisions to make: who purchases the devices, who pays for data plans and carrier contracts, and how does the company manage a mix of corporate and personal access to data on the devices.
The supercomputing arms race is heating up again between the United States and China, as China retakes the top spot in the 41st Top500 listing of the world's most powerful supercomputers with Tianhe-2, an updated system that was able to execute 33.86 petaflops, or 33.86 thousand trillion floating point operations per second.
Greater transparency, as well as respect for the Internet's open architecture and multi-stakeholder participation, are needed to help guide discussions around intellectual property policy on the Internet, according to the Internet Society.
Last week's disclosure of massive data collection efforts at the U.S. National Security Agency has generated heated debate in the U.S. and across the world about privacy. The NSA is collecting metadata on U.S. residents' phone calls made on Verizon's network and Internet records from nine Web companies, including Facebook, Google and Microsoft, according to reports in the Guardian and The Washington Post newspapers. But intelligence agencies in other countries have similar goals, according to reports, and in some cases there are few details about what data these governments are collecting.
Get Daily News by Email
Sign up and receive the latest news, reviews and trends on your favorite technology topics.