Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • A clear-eyed guide to Mac OS X's actual security risks

    Apple has improved its security in recent years, but is it enough?

  • Which smartphone is the most secure?

    These days, it is almost impossible to meet someone who doesn't own a cell phone. More specifically, smartphones, whether it be the trendy iPhone, corporate favored Blackberry or modern Windows Mobile, almost everyone has joined the smartphone frenzy - and with good reason. A smartphone offers more advanced computing ability and connectivity than a contemporary phone.

  • Why you should upgrade to Windows 8

    Microsoft?s new operating system may look like a radical departure from Windows 7, but it works, it makes sense ? and it?s the future.

  • Why small business is a prime target for hackers

    If you run a small business, and think that none of your data was of interest to a hacker, consider this: what if a hacker could take stolen bank account or credit card information from your computer and package it with the same information from a hundred or a thousand other small businesses? Would it be worth something then?

  • Ultrabooks still trying to find their niche

    Despite backing from the top PC makers, high prices and a disorganised software and hardware ecosystem could slow adoption of ultrabooks over the next few years, analysts said this week.

  • Fewer reboots in Windows 8 is a patching shell game

    Microsoft revealed in a post on the Building Windows 8 blog that the next-generation Windows OS will require fewer reboots for Windows patches and updates. To anyone who has lost hours of work thanks to an unexpected automatic reboot, that probably sounds awesome. But, there is a reason the system reboots, and the solution proposed by Microsoft doesn't solve the issue.

  • Computer infected? Blame yourself, Microsoft report concludes

    Zero-day exploits are nerve-racking for IT professionals but are far less dangerous than unpatched older vulnerabilities for which fixes are available, Microsoft says.

  • Why Windows 8 on ARM matters

    If Windows 8 works successfully on ARM-processor-equipped systems, expect to see thin, light, and innovative devices coming our way. This includes ultra-thin laptops with impressive battery life, and incredibly light, large-screen tablets.

  • Intel accelerates mobile chip strategy to compete with ARM

    Intel is speeding up the release of tablet chips in an attempt to close the power and performance gap with ARM, which dominates the tablet market, analysts said this week.

  • Ten free open source programs to treasure

    Want to know the best 10 free open source products? Here's a pretty good list

Featured White Papers

Windows 8.1 security

In the past six months, Windows 8 usage has doubled to nearly 6%. Windows 7 remains the top operating system, having increased to a 54% share. Windows XP continues to hold on to second place, despite a 7% drop in usage to 37%. As Windows XP's end of life approaches in April 2014, we can expect these trends to accelerate. Download this white paper to discover the main security features of your new Windows OS.
Download whitepaper

Setting up CIFS shares and joining the Active Directory

To locate resources on a network, a mechanism must exist whereby the resources can easily be found. A directory service, in the case of this paper, Active Directory, keeps track of all known resources and responds to requests with a list of currently available devices and services. But before you can be trusted to query for resources, you must be granted membership in the domain. Joining a domain accomplishes two tasks. First, for an N series storage system, it grants the required rights to query Active Directory, should it need to find other resources. Second, it provides a single management interface through MMC for administration of security and users' access levels to the N series storage system.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map