Fast jeder kennt das Problem: Eben hat man noch die Excel-Arbeitsmappe gespeichert, und schon bräuchte man genau diesen Pfad, um ihn an die ebenfalls am Projekt beteiligten Kollegen zu senden. Schließlich ist es allemal besser, nur den Link und nicht die ganze Datei beispielsweise per Mail zu versenden. …mehr
Premium-Inhalt. NASA acknowledged Friday an attack on one of its websites by "The Unknowns," a group that has been publicly trickling information on websites it has hacked over the last few weeks.
Premium-Inhalt. Samsung one-upped itself and gave the one of the biggest displays available for smartphones. It's the latest example of a trend by iPhone competitors to to differentiate themselves. The first Galaxy S phone had a 4-inch screen, and Samsung moved up to 4.3-inch on the SII. The S III, with its 4.8-inch screen, or the HTC One X's 4.7 inches, dwarf the iPhone, which has had a a 3.5-inch since 2007.
Premium-Inhalt. Adobe today warned that hackers are exploiting a critical vulnerability in its popular Flash Player program, and issued an emergency update to patch the bug.
Premium-Inhalt. issues are exerting a ton of pressure and monetary concerns on the executives in charge of keeping and .
Premium-Inhalt. The iOSsphere sees the world in a grain of sand, or at least, in obscure internal electronic components. The discerning eye can see the true implications of an unchanged SIM card tray design, for example.
Premium-Inhalt. Oracle has asked a judge to bar Google from using some testimony given by former Sun Microsystems CEO Jonathan Schwartz in the companies' intellectual-property suit over the Android mobile OS, saying it has "no legal and factual predicate."
Premium-Inhalt. It was just a couple months ago that , making itself that much more attractive to business users seeking an affordable alternative to Microsoft Office.
Premium-Inhalt. Almost a full year has passed since I last (DRM), but the restrictive technology continues to plague users around the globe. To help bring attention to the ongoing negative consequences of DRM, the Free Software Foundation has declared Friday this year's International Day Against DRM.
Premium-Inhalt. Eat, drink, and be Harry! This week's roundup of iOS apps features new ways to travel, make cocktails, and play games as your favorite Hogwarts wizard.
Premium-Inhalt. The jury has reached a partial verdict in the copyright phase of Oracle's intellectual property dispute with Google, and the judge has given them more time to try to resolve the remaining issue.
Premium-Inhalt. The deadline to migrate email domains and websites hosted on the Microsoft Office Live Small Business (OLSB) online service suite passed on Monday, but customers continue to post a steady stream of complaints and problem reports, indicating that the number of businesses that haven't made the transition is considerable.
Premium-Inhalt. Most users of Facebook and Google had fundamental gaps in understanding, even after reading privacy policies, about how the websites handled their information and how other Web users could discover it, according to a study released by the digital branding firm Siegel+Gale [cq].
Premium-Inhalt. Cybercriminals have already figured out how to hack into enterprise infrastructure, and the critical infrastructure that controls our nation's supply of water, gas, oil and electricity just might be next.
Premium-Inhalt. The jury failed to reach a verdict Friday on the copyright issues in Oracle's Java infringement lawsuit against Google and will be given until Monday to try to make a decision.
Premium-Inhalt. Apple won't help if you jailbreak an iPhone and something goes wrong with the hardware, but third-party warranty provider SquareTrade will.
Premium-Inhalt. The first wave of laptops with Intel's latest third-generation Core processors started shipping this week with Windows 7, but PC makers are quiet about what it would take to upgrade the PCs to run Microsoft's upcoming Windows 8.
Premium-Inhalt. Android malware being automatically distributed from hacked websites looks like it's being used to mask online purchases, and could be part of a fraud gang's new push into mobile, researchers said today.
Premium-Inhalt. All the momentum and vision that Yahoo CEO Scott Thompson has been building for the struggling company may have been thrown off course.
Premium-Inhalt. Johns Hopkins University engineers are using diamonds to change the properties of an alloy used in , a change that could lead to the development higher capacity storage systems that retain data more quickly and last longer than current media.
Premium-Inhalt. Mine was originally a mixed marriage: I’m a Mac, my wife was a PC. Years ago, though, after yet another virus had rendered my beloved’s Windows machine unusable, I insisted she switch. (She did so begrudgingly, but she’s since become a contented Mac user.) I smoothed the transition by copying all of her old files from her Windows PC to her Mac, but some tracks from her iTunes library, for whatever reason, didn’t made the leap.
Premium-Inhalt. Filler 2 is a Flash game in which you have to fill up the screen with balls while avoiding small circles that bounce around chaotically. It sounds simple, because it is. But it's also lots of fun, and on the lowest difficulty setting, it can even be soothing. Then again, if you are looking for a challenge, later levels on the Hard setting verge on frustrating.
Premium-Inhalt. Wait until the second half of this year, and you might be able to get a super-thin and lightweight for just $599. These lower-priced Ultrabooks, however, will use plastic materials for the chassis, rather than the more pricey aluminum used today.
Premium-Inhalt. It is not news that Facebook, the behemoth of social networking, is less than aggressive about protecting the personal privacy of its 900 million users. But even relatively savvy users may not be aware of how much of their information is collected, how it is used and how little control they may have over it.
Premium-Inhalt. Intel, which last year acquired McAfee for its expertise, today described work it is doing to provide enterprises with a way to secure data stored in public or hybrid .