How to stop Windows 10's annoying Microsoft Office ads

Rather than upgrading to Office to stop Windows 10 from bleating about it all the time, take these steps instead.

Think you're agile? You're probably wrong

A new study by Oracle and Opinium Research finds that businesses around the world overestimate their ability to flexibly manage workloads or rapidly develop, test and launch new applications.

10 Apple rumors that never happened

Never take an Apple rumor as fact...

Google's container management service exits beta, gets uptime guarantee

Google has made it official. It is now offering the Google Container Service as a commercial service, allowing customers run full micro-services architecture on the Google Cloud

Four weeks after launch, Windows 10 is already on 75 million PCs and tablets

Microsoft’s free upgrade offer is having the desired effect, as Windows 10 uptake outpaces earlier versions.

Smart refrigerator hack exposes Gmail login credentials

A bonus feature on a smart home product becomes a security liability.

IBM integrates its Blue Box platform across the network

The ultimate test of an acquisition is when the acquired product is integrated into the products and services of the acquirer. On this occasion, IBM has performed well by this measure.

How HP used big data to optimize its fleet of 6,000 vehicles

When you own 6,000 cars, any efficiencies you can gain equate to big bucks

How to stop Windows 10's annoying Microsoft Office ads

Rather than upgrading to Office to stop Windows 10 from bleating about it all the time, take these steps instead.

Symantec hits the 1 billion protected IoT devices mark

Symantec is now securing in excess of one billion Internet of Things (IoT) devices and has said the channel has a big role to play in the market going forward.

Office 2016's Windows release tipped for September 22

Microsoft’s productivity suite is getting a big boost in collaboration features, but few design changes

Brocade brings visibility to the storage area network

With a new analytics monitoring platform, Brocade aims to make the SAN easier to manage.

Securing the enterprise digital footprint

You need to continuously discover unknown digital assets, maintain an inventory of these assets, monitor for threats and engage to remediate risks as they appear

Virtualization doubles the cost of security breach

When a security incident involves virtual machines, the recovery costs double compared to that of a traditional environment

Brace for these 5 big changes in Bootstrap 4

An alpha is out for the next version of the popular Web design framework, so here's what designers interested in migrating from Bootstrap 3 need to keep in mind

Think all software changelogs are boring? Think again

The Strange Log proves that sometimes even the driest-sounding things can actually be pretty entertaining

Are wearables dead? This report says consumer interest is declining fast

A new report shows a steady drop in consumer interest in wearables. But will the smartwatch save the market?

The incident response plan you never knew you had

Five strategies to give your incident response plan a headstart by using key components of the business existing continuity plan (BCP).

How Not to Anger a CIO

What pleases a CIO? Well, it is team work and backing him when in choppy waters. Here are the takeaways. 

How NextDrop is solving urban India’s water woes

NextDrop’s smart solution informs users of water supply in their area and takes water management to the next level.

How Polaris saved 1.3 million unproductive hours by going social

UnMail, earlier known as Octopus, is the newest ESN in town. A product of IDAL of the Polaris Group, it helped the company reduce attrition and support calls, and increase productivity.

Why the world's top computing experts are worrying about your data

'We are living in a black box society,' one scientist said

Impossible! Management listens -- and hires more people

A dedicated and hard-working IT team is rewarded for its loyalty after a new CEO acts on the results of an internal audit

The IT Party is not Over: Shashi Kumar, CEO and MD, Happiest Minds

Does automation endanger IT jobs? How will affect the ability of an IT firm to being competitive differentiation? And will automation change the way we evaluate IT workers? Shashi Kumar answers these questions and more. 

MIT researchers eliminate data loss from computer crashes

Hardware errors, power failures, and software bugs won't matter anymore if some scientists' ideas are correct.

7 reasons why modular smartphones are such a nightmare to develop

Here are the top seven reasons why it's so difficult to develop smartphones that let users swap out the processor, camera and storage options.

Researchers create P2P Alibi Routing to avoid censorship and government surveillance

University of Maryland researchers developed P2P Alibi Routing to allows users to choose where they do NOT want their packets to go, thereby avoiding 'censorship of Internet traffic and suspicious boomerang routing.'

Certifi-gate flaw in Android remote support tool exploited by screen recording app

An app developer found that he could trick TeamViewer to enable screen recording on Android.

New JavaScript-based language brings the speed

A new language, Imba compiles to JavaScript and leans heavily on tags and selectors.

Intel unveils ultra-tiny, fully upgradable '5x5' mini-PC motherboards

Intel rolled out a new motherboard at its developer conference that offers more power than a NUC, but less than the mini-ITX.

Why developers have more power than you think

Jeff Lawson is a walking, talking example of the rise of the developer. Today, he's the CEO of API economy darling Twilio, but 20 years ago, he was another computer science student who saw the power of the Internet and wanted to try his hand at building Web applications.

AI is coming: How to deal with this new type of intelligence

The future of AI will be determined to a large extent by our ability to nurture a positive working relationship with this new type of intelligence. And that won’t be easy.

Kill Flash? Be careful what you wish for

The death of Flash will impact more than a few enterprise IT solutions, with nasty repercussions for admins

How IT can communicate more effectively with the business

You might think you are communicating clearly, but the reality is that business and IT people speak different languages.

How Facebook engineers conquer elusive app memory leaks

Programmers needing a break from marathon debugging sessions may want to peruse a blog post from two Facebook software engineers, who offer tips and war stories about rooting out elusive memory errors in the social network's iOS app.

Deep Dream: Artificial intelligence meets hallucinations

Neural networks can not only identify images, they can be used to generate images Hieronymus Bosch would have been proud of.

How to use Windows 10's File History backup feature

Windows 10's File History is an easy way to get started with backing up your personal files.

Linus Torvalds: Security is Never Going to be Perfect

Linus Torvalds made a surprise appearance at LinuxCon and talked about containers, security, and IoT, among other topics.

Lazy logging in the cloud will cost you big

Too many organizations log all cloud activities because they can. Here's what you should do instead.

Theft of devices having patient data remains a major security threat in healthcare

Nandkishor Dhomne, CIO, Manipal Health Enterprises, highlights the challenges surrounding security and how to enlighten business about its significance. 

Logentries launches Docker log management and analytics service

Another day, another example of a company jumping on the Docker bandwagon and supporting the latest, greatest in some way.

Windows 10: Microsoft lays its smartphone ambitions to rest

The company wants us to believe that Universal apps — usable on all Windows 10 devices — will save the day for Windows Phone. It’s already clear that won’t be happening.

Does the iPad have a future?

iPad sales have slumped as smartphone sales continue to surge.

The US presidential candidates have a lot to say about the H-1B visa program

The US general election is picking up pace, and most of the Republican and Democratic candidates have taken stands on the H-1B program, which can deeply affect the Indian IT sector.

In numbers: Akamai State of the Internet Security Report 2015

India was also one of the top target countries for web application attacks in Q2 2015.

Ashley Madison self-assessments highlight security fears and failures

Internal assessments highlight core concerns for company executives