Premium-Inhalt. New browser market share data shows that both Internet Explorer and Firefox lost ground in April. While Microsoft and Mozilla trumpet their latest browsers, publicly trade jabs, and beat their chests at one another, Chrome and Safari are quietly gaining market share.
Premium-Inhalt. , one of the Internet's most popular free DNS services, is now offering production-grade support for , an upgrade to the Internet's main communications protocol known as IPv4.
Premium-Inhalt. Here's the weekly roundup of iPhone 5 rumors from around the Web, and they range from the latest on everything from more white models to wireless charging to the coming of iOS 5.
Premium-Inhalt. Is the white iPhone really thicker than the black iPhone? One publication attempts to satisfy our curiosity with the application of rigorous science. Elsewhere, Apple's rumored cloud service may have a codename, and Cupertino wins round one of a patent dispute. The remainders for Monday, May 2, 2011 are innocent until proven guilty.
Premium-Inhalt. The Acer Iconia 6120 laptop is one of those marquee, "halo" products meant to draw attention to the brand as much as to satisfy everyday computing needs. In many ways it's a pretty ordinary 14-inch laptop. The standout feature, however, is its second 14-inch multitouch screen, which replaces the entire lower keyboard-and-touchpad deck. As high-concept products go, the Iconia is fairly affordable at $1199 (as of May 2, 2011). Still, at that price it isn't a very good deal, and you're better off choosing something a little more down to earth. Acer's dual-touch implementation of a Windows laptop is about as good as you could expect it to be, but it's just not a great idea in the first place.
Premium-Inhalt. Julian Assange claims that Facebook is complacent in providing the U.S. government with a way to spy on its citizens, calling it "the most appalling spying machine ever invented."
Premium-Inhalt. This morning, Research In Motion (RIM) officially announced its latest smartphone, the BlackBerry Bold 9900/9930, at its annual BlackBerry World Conference in Orlando.
Premium-Inhalt. Not quite out of the frying pan, but into the fire anyway: Sony just acknowledged another network breach related to the first one.
Premium-Inhalt. If you're a Verizon iPhone--and Windows--user, you can now jailbreak your phone! iDevice hacker just released an update to , which brings untethered jailbreaking support to the Verizon iPhone 4. This means that you can finally use (an alternative app store with software for jailbroken iDevices) on your Verizon iPhone.
Premium-Inhalt. The Pakistani programmer who dubbed himself "the guy who liveblogged the Osama raid without knowing about it" is also the guy who got his website hacked without knowing about it.
Premium-Inhalt. The , launched last month by RIM has been relatively successful thus far despite being almost universally slammed as being an incomplete work in progress in initial reviews. Well, one of the missing features will soon be added when the Video Chat app becomes available.
Premium-Inhalt. Can a chief information officer (CISO) help prevent the kind of massive data breach that occurred in the Sony PlayStation network breach last month in which of the PlayStation and Qriocity online games?
Premium-Inhalt. VMware's attempt to recover from an outage in its brand-new service inadvertently caused a second outage the next day, the company said.
Premium-Inhalt. Twenty-five years ago -- when Network World was born -- the Internet was only 3 years old itself. At that time, less than 2,500 hosts were connected to the Internet and maybe 10,000 people used it regularly. Now there are more than 800 million hosts and 1.8 billion regular users.
Premium-Inhalt. If you're an home broadband subscriber, the all-you-can-eat buffet is closed. May 2 marks the start of data caps for AT&T and customers.
Premium-Inhalt. According to the figures recently published by the UK Department of Health, to the date 31st March 2011, only 186 out of 396 acute, mental health, ambulance and primary care trusts reported to have met the targets set by the" Pseudonymisation Implementation Project". According to this project (description available at: http://bit.ly/k1utU1) , comprised within the Connecting for Health strategy, to undertake secondary use of patient data in a legal, safe and secure manner, all NHS trusts need first to encrypt information to pseudonymise records, thus ensuring complete patient privacy.