The Logic Behind Renaming Facebook

Naming is one of those marketing department jobs that should be avoided like the plague, because everyone will have an opinion. And in the...

News Around the Web

Alibaba Introduces Arm-Based Server Chip for Cloud Data Centers

Chinese e-commerce giant Alibaba is rolling out Arm-based processors designed in-house that will power servers within the organization’s data centers, improving the energy efficiency...

HP Wolf Security Report Shows Threat Landscape Getting Scarier

When it comes to securing PCs and Printers, HP is the most advanced of hardware vendors. This advantage is because HP is more focused...

Dell Unveils New Servers for a Changing IT World

Dell EMC is rolling out new servers that take into account the increasingly distributed nature of modern IT environments. The latest PowerEdge systems, unveiled last...

Microsoft Surface Laptop Studio & Win11: What the MacBook Should Have Been

One of the problems with the customer lock-in strategy that Apple uses is that the vendor tends to take customers for granted. Unlike Microsoft...

Top Stories

Alibaba Introduces Arm-Based Server Chip for Cloud Data...

Chinese e-commerce giant Alibaba is rolling out Arm-based processors designed in-house that will power servers within the organization’s data centers, improving the energy efficiency and performance of the facilities...

HP Wolf Security Report Shows Threat Landscape Getting...

When it comes to securing PCs and Printers, HP is the most advanced of hardware vendors. This advantage is because HP is more focused on endpoint devices like printers...

Dell Unveils New Servers for a Changing IT World

Dell EMC is rolling out new servers that take into account the increasingly distributed nature of modern IT environments. The latest PowerEdge systems, unveiled last...

Microsoft Surface Laptop Studio & Win11: What the MacBook Should Have Been

One of the problems with the customer lock-in strategy that Apple uses is that the vendor tends to take customers for granted. Unlike Microsoft...

Crown Electrokinetics: Smart Windows Become Real

Smart Windows have a lot of promise. Eventually, these windows may be able to both block out light, increase privacy, and showcase scenes from...

The Microsoft Surface Duo 2 One-ups the iPad Mini

Last year, my favorite phone was the Microsoft Surface Duo, but while it met my needs impressively well for a first-generation product, it had...

Security News

HP Wolf Security Report Shows Threat Landscape Getting Scarier

When it comes to securing PCs and Printers, HP is the most advanced of hardware vendors. This advantage is...

Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing

Microsoft announced this week that the company is moving away from passwords. This move may seem sudden, but I...

The Coming AI Threats We Aren’t Prepared For

Artificial intelligence, like any other tool, isn’t inherently good or bad. But AI does automate and emulate other things...

IT Management News

Dell Unveils New Servers for a Changing IT World

Dell EMC is rolling out new servers that take into account the increasingly distributed nature of modern IT environments. The...

11 Automation Strategies to Optimize End-to-End Workflows

How can a business automate and effectively optimize end-to-end workflows? To help organizations determine ways to automate business processes, we...

ServiceNow Enhances the Now Platform for Hybrid Work

ServiceNow is increasing its focus on human resources and employee workflows as the business world continues to settle into...

Top Blogs

Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing

Microsoft announced this week that the company is moving away from passwords. This move may seem sudden, but I was part of a study...

Why AMD Has Been So Successful: Mark Papermaster

This week Mark Papermaster had a fireside chat with a few of us analysts on the topic of AMD's remarkable rise from the ashes...

Another Crazy Week in Cybersecurity

Ever since the SolarWinds hack in December, the pace of cybersecurity attacks seems to have picked up, but lately the revelations have been coming...

Colonial Pipeline Lessons: Ransomware (and Security) Steps Everyone Should Take

From the SolarWinds hack to the Colonial Pipeline ransomware attack, cybersecurity has entered into public consciousness like never before. How can you avoid falling victim...