Microsoft will renounce its "make-them-eat-Metro" strategy in an update for Windows 8.1 slated to ship this spring, if leaked preliminary builds reflect the final product....
If hitting a target is hard and hitting a moving target is even harder, then creating a new hit technology is next to impossible because the shape and nature of the target morphs as it moves. Think of building a swish new laptop just as laptops are heading out of favor, or a must-have mobile app just as smartphones plateau, or a dynamite tablet experience just as the wearable future takes hold....
Which U.S. cell phone service is the best when it comes to what you really use a phone for these days -- data? Which gives you the most widespread and reliable access to its data network, fast upload and download speeds, the most bang for your buck?...
Nvidia, one of the biggest GPU manufacturers in the world, made a series of code contributions to the open-source project Nouveau late last week, signaling a possible thawing of relations with the Linux community....
SDN start-up Pluribus Networks said this week its server-switch and network hypervisor product line is generally available....
VMware has asked at least two companies who planned to setup booth displays at its Partner Exchange conference next week not to attend the show....
When users complain that an application is slow or when customers abandon online sessions without buying anything, the cause of the problem is often elusive and mysterious. You know that the network connections are tight and the servers are humming, but the problem persists....
Lodgers at Holiday Inns, Marriott and Renaissance hotels may have had their payment card details compromised following a new disclosure on Monday of suspected point-of-sale device attacks....
The total compensation packages of top executives at Intel fell sharply in 2013 as a result of changes in the way the chip maker pays senior employees....
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable....