Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

LAPTOP

Topic Zone

Latest News

Latest Features

  • Fedora tips its hat to mobility, cloud, big data

    The latest release of Fedora, nicknamed "Heisenbug," is a step towards making Fedora a player in the mobile arena. Fedora 20 also includes more support for cloud, and this is also the first release that supports cheap, low-power ARM processors as a primary architecture, in addition to Intel and AMD chips.

  • Predictions gone wrong: Losing bets analysts made for 2013

    Cast your mind back to the late 2000s -- when the iPhone 3G beguiled consumers and the iTunes App Store began shifting users' ideas about how they bought and used software, when Microsoft pros saw nothing but clear skies after Windows 7 cleared out the Windows Vista storm, when green technology was touted as a transformative force in IT.

  • The worst tech predictions of 2013 -- and two that hit the mark

    From the social network in business to the 'success' of the Chromebook to the launch of iTV, the pundits got it wrong, wrong, wrong

  • How Windows Red can fix Windows 8: The right strategy for Microsoft

    When Microsoft first outlined its strategy 32 months ago to bridge the old style of PC computing with the new world of tablet computing, we were optimistic. Although Apple had revolutionized computing with the iPad, creating the fastest-adopted technology ever, its approach walled off the tablet from the PC, with two different operating systems, user interfaces, and applications. Instead, Microsoft promised a unified, adaptive approach that would satisfy everyone.

  • The hidden dark side of today's hottest tech trends

    New technologies and new IT strategies are here to solve all your problems -- except the ones they create

  • Bluewolf co-founder: IT should be approached from the outside in

    The promise of software-as-a-service (SaaS) is that it is simple, quick, efficient and commoditised, but in reality SaaS can be just as complex to install and manage as major on-premise implementations.

  • Why Office 365 is a better deal than Office 2013

    The new Microsoft Office is here. As with the previous versions, you can get Word, Excel, PowerPoint and more as a locally installed suite of applications or as Office 365, a cloud-based subscription. However, choosing between Office 2013 desktop software and the new Office 365 is a dramatically different decision than in the past.

  • Microsoft's CES no-show: Epic fail or epic foresight?

    It should've been awkward. This year's CES is the first show since Microsoft's amicable split with the Consumer Electronics Association. Redmond severed deep ties, giving up an annual booth in a marquee floor spot, and sidelining the dynamic duo of Ballmer and Gates, who had warmed up the crowd at 15 of the past 18 opening keynotes. Going in to this year's show, we expected the ambiance to match that first uncomfortable Thanksgiving dinner after your parents get divorced.

  • The fall of the ultra-hyped ultrabooks in 2012 - can they make a comeback?

    Just 12 months ago, the ultrabook was widely regarded as the PC market's savior. Since then, it's become more of a punch line.

  • 12 personal security resolutions for 2013

    Among your typical New Year's resolutions - lose weight, stop smoking, be happier - you should consider making some pledges to better secure your digital life. You might even be healthier if you can prevent the stress of a digital disaster, like malware wiping out your PC, having your online accounts hacked, or becoming a victim of identify theft because of a phishing scam or data theft. With that in mind, here are some security resolutions you should consider for the new year.





Featured White Papers

Delivering Next-Generation Virtual Workspaces enabled by VMware View and Cisco Data Centre Infrastructure

The traditional approach to managing desktops in a global enterprise has become untenable. Increasingly, geographically dispersed user endpoints, in the form of desktop and laptop computers and personal devices, are making ?desktop? management and security nearly impossible. Download this white paper to enable your organisation to eliminate the guesswork from the implementation of a strategic next-generation end-user workspace infrastructure. In association with Intel® Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries
Download whitepaper

Controlling laptop and smartphone access to corporate networks

Smartphones have joined laptops as de facto network endpoints in corporations, academic institutions and government entities. In managing security for these mobile devices, IT must be aware of the differences, as well as similarities, between laptop and smartphone platforms. With these distinctions in mind, IT can apply best practices to ensure the confidentiality and security of corporate communications from both inside and outside of the network perimeter. Download this white paper to understand how your organisation can control laptop and smartphone access to corporate data to improve security and data management.
Download whitepaper

Understanding the risks of mobile applications

Mobile applications may have several types of security risk: language inherent risk, based on common security flaws in the language; malicious data exfiltration, in which sensitive data is surreptitiously transmitted from the phone; and platform specific risk, based on specific vulnerabilities inherent in the mobile platform.
Download whitepaper

Network problems on the frontline

This whitepaper looks at the problems facing technicians today, and illustrates how self-interpreting tools will turn network techs into fast problem solvers, not just problem finders.
Download whitepaper

Online PC backup

This paper looks at the need for laptop and desktop data protection and, based upon recent IDC research, the key requirements firms should consider in evaluating enterprise-level online PC backup solutions.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map