VMware and Lumen enhance partnership to support distributed workforces
VMware

VMware and Lumen enhance partnership to support distributed workforces

Secure, low-latency edge computing is the goal of this expanded partnership
29 Sep 2020
Google officially closes its revenue-share loophole
Google Android

Google officially closes its revenue-share loophole

Developers have until September 30 to comply or risk being dropped from the Google Play Store
30 Sep 2020
Salesforce aims to help manage coronavirus vaccine demand
sales & CRM

Salesforce aims to help manage coronavirus vaccine demand

New Work.com solution will streamline vaccine administration, outreach, inventory and more
29 Sep 2020
The ultimate guide to landing a cybersecurity career
Careers & training

The ultimate guide to landing a cybersecurity career

6 steps to landing a lucrative cybersecurity career
30 Sep 2020

Latest News

View all
Google officially closes its revenue-share loophole
Google Android

Google officially closes its revenue-share loophole

Developers have until September 30 to comply or risk being dropped from the Google Play Store
30 Sep 2020
VMware talks up multi-cloud and Kubernetes at VMworld 2020
cloud computing

VMware talks up multi-cloud and Kubernetes at VMworld 2020

Pat Gelsinger takes to the virtual stage to talk about his vision for the future of cloud
30 Sep 2020
IBM: Ransomware incidents "exploded" in June
ransomware

IBM: Ransomware incidents "exploded" in June

IBM Security X-Force report also finds that ransom demands are increasing to as much as $40 million
30 Sep 2020
DuckDuckGo slams Google's search engine auction as "fundamentally flawed"
Google Android

DuckDuckGo slams Google's search engine auction as "fundamentally flawed"

Search engine outfit says "pay-to-play" auction is only serving to strengthen Google's dominance
30 Sep 2020

Most Popular

16 ways to speed up your laptop
1.Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
2.Laptops

16 ways to speed up your laptop

16 Sep 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
3.malware

Google removes 17 apps infected with evasive ‘Joker’ malware

28 Sep 2020
Microsoft 365 outage hits Azure, Outlook, and Teams
4.cloud computing

Microsoft 365 outage hits Azure, Outlook, and Teams

29 Sep 2020
IoT coffee machine hacked to demand ransom
6.ransomware

IoT coffee machine hacked to demand ransom

28 Sep 2020
Chrome vs Firefox vs Microsoft Edge
7.web browser

Chrome vs Firefox vs Microsoft Edge

23 Sep 2020
Should you learn to code?
8.Careers & training

Should you learn to code?

28 Sep 2020
What is cache memory?
9.data processing

What is cache memory?

14 Sep 2020
How to delete a Facebook business page
10.social media

How to delete a Facebook business page

15 Sep 2020

Resources

The secure DevOps imperative
DevOpswhitepaper

The secure DevOps imperative

30 Sep 2020
The endpoint as a key element of your security infrastructure
cloud securitywhitepaper

The endpoint as a key element of your security infrastructure

30 Sep 2020
How to avoid cloud misconfigurations for operational excellence
automationwhitepaper

How to avoid cloud misconfigurations for operational excellence

29 Sep 2020
A guide to becoming cloud-native smart and secure
cloud managementwhitepaper

A guide to becoming cloud-native smart and secure

29 Sep 2020
Four security considerations for cloud migration
hybrid cloudwhitepaper

Four security considerations for cloud migration

29 Sep 2020

In-Depth & Tutorials

View all
The ultimate guide to landing a cybersecurity career
Careers & training

The ultimate guide to landing a cybersecurity career

30 Sep 2020
What is data and big data mining? An easy guide
Business strategy

What is data and big data mining? An easy guide

30 Sep 2020
IT Pro 20/20: The future of augmentation
augmented reality (AR)

IT Pro 20/20: The future of augmentation

30 Sep 2020
How digital workspaces are changing the way we work
software as a service (SaaS)

How digital workspaces are changing the way we work

30 Sep 2020
Secure your Wi-Fi against hackers in 10 steps
network security

Secure your Wi-Fi against hackers in 10 steps

29 Sep 2020

Latest Reviews

View all
StarLeaf Huddle review: A star performer
video conferencing

StarLeaf Huddle review: A star performer

30 Sep 2020
Zyxel ZyWall ATP100 review: Cost-effective, but not cloudy
unified threat management (UTM)

Zyxel ZyWall ATP100 review: Cost-effective, but not cloudy

29 Sep 2020
Logitech Room Solution for Microsoft Teams review: Hassle-free video conferencing
video conferencing

Logitech Room Solution for Microsoft Teams review: Hassle-free video conferencing

28 Sep 2020
WatchGuard Firebox T20-W review: Superb all-in-one protection
unified threat management (UTM)

WatchGuard Firebox T20-W review: Superb all-in-one protection

25 Sep 2020
Fujitsu Storage Eternus AF250 S3 review: Fast storage in a flash
flash storage

Fujitsu Storage Eternus AF250 S3 review: Fast storage in a flash

24 Sep 2020

Podcasts

View all
The IT Pro Podcast: Tech's coronavirus triumphs and tribulations
Business strategy

The IT Pro Podcast: Tech's coronavirus triumphs and tribulations

25 Sep 2020
The IT Pro Podcast: Will VR ever be mainstream?
Technology

The IT Pro Podcast: Will VR ever be mainstream?

17 Sep 2020
The IT Pro Podcast: The myth of reputational damage
data breaches

The IT Pro Podcast: The myth of reputational damage

10 Sep 2020
The IT Pro Podcast: Cyber security post-Brexit
cyber security

The IT Pro Podcast: Cyber security post-Brexit

4 Sep 2020
The IT Pro Podcast: The DARQ side of security
Technology

The IT Pro Podcast: The DARQ side of security

28 Aug 2020