Apple Tuesday announced its “biggest step” with its tablet line, but took only about 20 minutes out of its hour-plus presentation to do it: a years-in-the-making slimmed down version of the 9.7-inch iPad, now dubbed iPad Air, and a high-resolution display for the 7.9-inch iPad mini. The biggest shock: a $70 price increase for the smaller tablet, to $399....
The Firefox web browser will, henceforth, require users to manually activate Java objects on sites that they visit, Mozilla has confirmed. The change is aimed at improving security and moving away from a dependence on proprietary plug-ins, but critics say it will cause untold headaches for developers, admins and less-technical end-users....
Blackberry says its new app that opens up the proprietary BBM messaging platform to Android and Apple users was downloaded 10 million times in just over its first 24 hours of availability....
Along with new iPads, MacBook Pro notebooks and the donut-shaped Mac Pro announcements, Apple quietly released Tuesday an update for iOS 7, with a range of improvements and bug fixes....
Apple's move to offer its latest desktop operating system, OS X Mavericks, for free isn't going to affect the Linux operating system at all, its creator Linus Torvalds said....
First came desktop security, then laptop security. But the next wave -- mobile -- throws new wrenches into the works, as IT is now supporting multiple types of devices and warding off sophisticated threats. Here's how IT leaders are coping....
Juniper Networks is cutting its workforce by 280, or 3%, this quarter as it realigns resources in high growth opportunities....
Cisco will boost its enterprise collaboration stack with products designed to simplify the way companies secure communications, interact with external parties and manage their collaboration tools....
It is 30 years old and dominates the word processing market, but Microsoft Word is now more than ever fending off challenges from the cloud where less expensive and even free alternatives pose new threats, experts say....
Useful and legitimate metrics have long evaded the information security community as a whole. Without proper metrics, you cannot truly prove the value of a security program. This makes it difficult to justify increasing the budget and even maintaining the budget that you have....