Monthly Archives: April 2015

SMB1 protocol

Microsoft: Start Preparing for SMB1’s Demise

0
Server Message Block version 1 (SMB1) is being phased out, and organizations that are still relying on the protocol may have a tough time...
Google

Google Launches Its ‘Project Fi’ Wireless Phone Services

0
Google's rumored "Project Fi" cell phone services are a rumor no more. The search company today announced the new service, which will charge smartphone...
Daily Video 422B

Daily Video: Alcatel-Lucent Launches Cloud Communications Platform

0
Today's topics include enterprise business opportunities from Alcatel-Lucent, new features for Android Wear users, updates for Microsoft Intune and results from a significant study...
Google search

A Cheer for Google’s Higher Rankings for Mobile-Friendly Web Pages

0
Web searching on the small screen of my Samsung Galaxy S4 smartphone is maddening enough compared to the searches I perform on the large,...
IT security education

Juniper Aims to Help Improve IT Security Education

0
SAN FRANCISCO—When it comes to IT security, Christofer Hoff, vice president and security CTO at Juniper Networks, believes it's important to train people as...
802.11ac

802.11ac WiFi Products Gaining Market Share as Older Devices Decline

0
The latest 802.11ac WiFi-compliant devices, from routers to access points and everything in between, are gaining market share worldwide, compared with their older, slower...
OnePlus One

10 Reasons OnePlus One Is a Strong Alternative Android Smartphone

0
10 Reasons OnePlus One Is a Strong Alternative Android Smartphone by Don Reisinger The Design Isn't Spectacular, but Solid Looking at the design of the OnePlus One,...
Apple Watch

Apple Lures Developers With Special Apple Watch Offer

0
Apple so badly wants iOS developers to envision, create and offer new apps for its upcoming Apple Watch that the company is making special...
IT overhaul

Met Police to Replace Core IT System

0
By Matthew BroersmaThe Metropolitan Police has confirmed it plans to commence procurement of an integrated system to replace its core IT facilities later this...
Data protection

Eight Ways to Use Open Source for More Effective Data Protection

0
Eight Ways to Use Open Source for More Effective Data Protection by Chris Preimesberger Take a Page From EMEA's Book U.S.-based organizations need to place a greater...