Daily Video: Dell Brings Predictive Support to Business PCs, Tablets

Dell is extending the ProSupport Plus service that it has in place for data center systems like servers and networking gear to its business PCs and tablets.

What's more, the company is including the ability for the technology to monitor the health of the systems and proactively report when problems occur, in an effort to make it easier for customers and IT departments to address issues that arise with their systems by including the vendor's SupportAssist technology in the ProSupport Plus service.

T-Mobile is offering its 7-inch Alcatel OneTouch Pop 7 tablet for free from Feb. 12 through Feb. 16 as part of its occasional "Tablet on Us" promotion.

The free 7-inch Alcatel OneTouch Pop 7 tablet is powered by Android 4.2 Jelly Bean, the device is free with the purchase of a new 1GB or higher monthly postpaid data plan. The tablet normally retails for $168, buy buyers only have to pay the sales tax.

According to a report recently released by security firms Invincea and iSight Partners, a suspected Chinese cyber-espionage group compromised popular media site Forbes.com in November 2014 in an operation designed to infect computers at companies in the financial and defense industries.

The attack infected Forbes.com's “Thought of the Day” Adobe Flash widget and configured it to serve up malicious code to visitors from targeted Internet addresses. The security firms detected evidence of the attack on Nov. 28, 2014, and Forbes removed the malicious file on Dec. 1.

Google is offering 2GB of free storage to users who review and manage their Google Account security settings over the next few days.

The company announced the offer Tuesday, Feb 10 on Safer Internet Day. Google wants users to review items such as account recovery, recent activity logs and account permissions.

Adding a phone number to the account recovery information, for instance, can aid in situations in which a user might be locked out of an account while a review of recent sign-ins can help users quickly detect suspicious account log-in attempts.

Top White Papers and Webcasts