Sharing a folder or file with something like Dropbox is easy, but you have to actually have a Dropbox account to do it. OneTimeBox does the same thing, but you don’t need an account and anyone can add files to the folder.
Sharing a folder or file with something like Dropbox is easy, but you have to actually have a Dropbox account to do it. OneTimeBox does the same thing, but you don’t need an account and anyone can add files to the folder.
If you’ve ever tried to produce a "designed" document such as an advert, flyer, invitation, brochure and so on, you probably looked at desktop publishing packages and then gave up. They’re all either incredibly complicated or incredibly expensive. Or both, of course.
Which is why the launch of LucidPress, which is neither complex nor expensive, is worth mentioning. In fact it couldn’t be simpler to use, and it’s free.
Read more at Lucidpress
If you’re in the market for a new tablet, you have a lot of information to sift through. Benchmarks, specs, software versions, supported apps, there’s a ton of data. TabletRocket makes it a little easier by putting any two tablets side-by-side so you can compare them directly.
Examining data from one million devices, Fiberlink, a mobile management firm, examined the often forgotten part of mobility in the workforce — laptops. While IT and security vendors focus on Google’s Android, Apple’s iOS, tablets, and smartphones, Lenovo’s ThinkPad and Dell’s Latitude chug along, remaining a stable fixture in the workplace. According to Fiberlink, almost 50 percent of the laptops observed in their study are running Windows XP.
Read the full article at Network World
When Microsoft Security Essentials started falling behind in effectiveness tests, LifeHacker stopped recommending it.
Microsoft is now officially saying that they’ve shifted their focus and establishing MSE as a "baseline."
Adobe announced it has been breached and attackers may have accessed source code for a number of products, and stolen 2.9 million customer records.
Read the full article at Threat Post