The weekend saw Dropbox users frustrated by issues with syncing and uploading files, as well as creating shareable links. The issues became so severe that the stability of Amazon Web Services (AWS) was called into question. According to a ...
IT hiring in 2013 will focus on jobs involving cloud computing, mobile technology and business intelligence, said staffing professionals. But cloud computing jobs for on-site infrastructure support and software management are likely to be ...
IDC says Big Data market outstripping IT as a whole by sevenfold. IT systems management firm Kaseya said firms must be mindful of the complexities of handling Big Data projects, and also bear in mind the "worrying skills shortage" in the ...
Tags: information, communication technology, Kaseya, IT, data technology
IDG News Service - Adobe announced on Monday a new version of its Acrobat desktop application for creating and editing PDF documents that now features integration with other Adobe cloud services and with Microsoft PowerPoint. Acrobat XI ...
Tags: Adobe, Acrobat desktop, PDF documents, Adobe cloud services
Data-center networking vendor Emulex plans to acquire Endace, a maker of network performance management hardware and software, for about $130 million, the companies announced. The buyout will add Endace's network monitoring appliances, ...
Tags: networking vendor, Emulex, Endace, hardware, software
IBM plans to issue fixes early next week for glitches that have hit Notes users who upgraded to the latest version of Google's Android OS. The problems occur on phones and tablets running Android 4.2.1 Jelly Bean, which Google recently ...
Tags: IBM, glitches, Notes users, Google, Android OS
IDG News Service - Bucking the corporate practice of buying instead of building internally, Google's corporate IT department will typically build management software itself, or adopt an open source software package, before investigating the ...
Tags: Google, IT, management software, software
IT often virtualises new applications and workloads by default.Virtualisation is now the norm,deploying a physical server the exception.Yet,a third of companies admit they have not invested in security for their virtual computing ...
In 2008 London accounted for 33.8%of new UK IT jobs.Most other regions recorded a reducing share of new jobs. A large proportion of London-based IT jobs are in the financial services sector which was hit hardest by the economic slowdown ...
Tags: IT workforce, London
The proper management of information security is one of the most important things that public organizations and private businesses should think of as the security of the company data is a major issue. The proper management of the ...
Tags: IT Security, Computer Products, Siscon
CIOs should stop worrying about BYOD according to analyst Gartner. Instead they should focus on technology transformation. The analyst company is urging CIOs to focus on technology-led business transformational change, instead of ...
Tags: CIO, BYOD, Gartner, technology transformation, IT
Employees who are offered bring-your-own-device(BYOD)initiatives and input into IT decisions are likely to be more productive in the workplace,according to research. Also known as the consumerisation of IT,such flexibility may enhance ...
Tags: consumerisation of IT, BYOD, productivity
Hewlett-Packard is extending its 3PAR enterprise storage offerings with an all-SSD version of the P10000 array. The all-SSD (solid-state disk) version, announced on Monday and available immediately starting at US$350,000, is designed to ...
Tags: HP, 3PAR enterprise storage, SSD version, P10000 array
The main thrust in enterprise systems this year has been the introduction of Windows 8 as the new Windows client OS. Windows 8 introduces WinRT, a new programming model for Windows software development, as well as a new way of thinking ...
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber