Refresh Stories


Top 10 Most Read Stories

What subscribers chose to read over the last 30 days

1. What are the differences between Office 2016 and Office 365?
Microsoft Office may be the de facto productivity tool for millions of workers worldwide, but it's no monolith. Rather than a single, towering smooth-black Office, there's a whole Stonehenge of options: Office on the iPhone, on iPad, Office on Android smartphones, Office on personal computers, Windows and macOS, Office with a handful of applications, Office with fistfuls'. But when you get down to it, there are really only two kinds of Office. One, which most label Office 2016, is the stand-alone suite that traces its roots back to the last...
Origional Story Date :7/17/2017
Research | Computerworld
Information Technology | Software | Business | Office
2. 6 things you should know about backing up your PC
Last week, Google announced the new desktop version of its Backup and Sync app, and it got me thinking: What does desktop backup even mean in 2017? Not so long ago, there was one and only way to protect the precious data riding around in your laptop: Connect an external drive (or, if you were really fancy, a network drive), then perform a complete system backup. But is that really necessary anymore? It's time to inject some modern thinking into the old notions of PC backups. Here's what you should know: It's all about the data...
Origional Story Date :7/24/2017
HowTo | CNET News
Information Technology | Hardware | Storage | Backup/Restore
3. Court rules FBI can continue to request data in secret
A court in San Francisco ruled in favor of the FBI when it comes to secret surveillance orders known as national security letters.  Getty The FBI can keep sending surveillance orders to tech companies and ban them from disclosing those requests, an appeals court ruled Monday.Internet company Cloudflare and wireless network operator CREDO Mobile sued the federal government to be allowed to disclose public national security letters they have received. They argued that the letters, which are administrative subpoenas issued by the... government to gather information for national security purposes, are unconstitutional because they violate the First Amendment's freedom of speech protections. Critics of national security letters -- like the Electronic Frontier Foundation, which represented Cloudflare and CREDO in the case -- say they "allow the FBI to secretly demand data about ordinary American citizens' private communications and internet activity without any meaningful oversight or prior judicial review." Companies that receive national security letters, or NSLs, are subject to gag orders, which means they can't even disclose they've received such orders unless the letters become declassified.
Origional Story Date :7/24/2017
News | CNET News
Information Technology | Legal | Privacy
4. China is using AI to predict who will commit crime next
This sounds a little like Minority Report to us. China is looking into predictive analytics to help authorities stop suspects before a crime is committed. According to a report from the Financial Times, authorities are tapping on facial recognition tech, and combining that with predictive intelligence to notify police of potential criminals, based on their behaviour patterns. Guangzhou-headquartered Cloud Walk has been trialing its facial recognition system that tracks a person's movements. Based on where someone goes, and when...
Origional Story Date :7/24/2017
News | Mashable
Information Technology | Artificial Intelligence
5. Modern Cyber-Crimes and How to Avoid Them
Hackers will continue to refine and adapt their methods to find their way around each new defense, so you must continually improve your cyber-security posture. After the recent WannaCry ransomware virus left organizations around the world in a state of turmoil, it became startlingly apparent that businesses need to be fully prepared for increasingly sophisticated hacking attempts. At the end of 2015, IBM’s CEO predicted that cyber-crime could be “the greatest threat” faced by every industry worldwide, and the severity of...
Origional Story Date :7/17/2017
HowTo | Baseline
Information Technology | Security | Cybercrime
6. 9 developer secrets that could sink your business
Application development can be a key differentiator for your business, and the wizards who can whip up a market-leading mobile app or just the right custom code to make the business hum are well worth the investment. But the truth is, we developers aren’t always straight with you. We have a few secrets we like to keep for ourselves. The fact that we don’t tell you everything is understandable. You’re the boss, after all. Do you tell your boss everything? If you’re the CEO, do you loop in the board on every decision?...
Origional Story Date :7/17/2017
Research | CIO Magazine
Information Technology | Software | Software Development
7. The Digital Workplace is Not About Software
A New Way of Working and Keys to Success If you enter “digital workplace” into a search engine, you’ll find some links to vendor pages as well as articles that touch on the different software needed to create a digital workplace. If you really dig, you may find some good information that goes beyond the technology, but I think organizations are still missing the mark. A digital workplace is not about a set of tools you put in place, but about providing a new way of working. This results in employees that are more engaged...
Origional Story Date :7/17/2017
Editorial | Business 2 Community
Information Technology | Technology Trends | Digital Transformation
8. Ransomware attack is cover for something far more destructive
As odd as it sounds, the ransomware attack that swept across the world over the past few days wasn't about the money. GoldenEye, also known as NotPetya, swarmed computers on Tuesday, locking up devices at multibillion-dollar companies including FedEx, Merck, Cadbury and AP Moller-Maersk. Combined, these four companies are worth about $130 billion -- big targets with fat wallets. You'd think the hackers would ask for more than $300 per hijacked computer...
Origional Story Date :7/1/2017
Editorial | CNET News
Information Technology | Security | Ransomware
9. Windows 10 in 60 Percent of Businesses, Spiceworks Survey Finds
As the two-year anniversary of the Windows 10 launch approaches (July 29), new research from Spiceworks indicates that enterprises may have warmed to Microsoft's latest desktop operating system, but Windows 7 still rules the roost. In its latest survey of desktop operating system penetration rates in business, Spiceworks, the IT management specialist and professional online community, found that a majority of organizations worldwide (60 percent) are running at least one instance of Windows 10 somewhere on their networks...
Origional Story Date :7/24/2017
Research | Eweek
Information Technology | Software | Operating Systems | Windows
10. Windows 10 Gains Controlled Folder Access Feature to Thwart Ransomware
In light of recent ransomware outbreaks, concerned IT executives may welcome Microsoft's decision to provide an early look at some of the advanced security features included in the upcoming Windows 10 Fall Creators update. Build 16232 of Windows 10 is currently available to members of the Windows Insider early-access program who are enrolled in the Fast ring. Among the many new features is a new setting in the built-in Windows Defender anti-malware feature that protects a user's data files from...
Origional Story Date :7/3/2017
News | Eweek
Information Technology | Software | Operating Systems | Windows | Security | Ransomware