IT Today: What Happened to Telepresence?, Slideshow: History of the Microprocessor

By - Source: Toms IT Pro
Tags :

Tom's IT ProTom's IT ProToday On TIP: Is Telepresence Just A Niche Product?, Enjoying the Ride on the IT Employment Roller Coaster, Moore’s Law In Pictures: An Illustrated History of the Microprocessor, Sponsored: Blade Servers Cut IT Costs, An Illustrated Guide to Windows 8 Enterprise Security Features, and more. 

Is Telepresence Just A Niche Product?

Telepresence and the opportunity to use cheap broadband data for virtual reality meetings was the buzzword of 2010. What Happened?

Enjoying the Ride on the IT Employment Roller Coaster

With the pace of new technology introductions in information technology accelerating, IT pros are well-advised to develop enthusiasm for life-long learning and skills development.

Moore’s Law In Pictures: An Illustrated History of the Microprocessor

Consider the orders of magnitude (and sheer manufacturing prowess) required to morph the very first 4-Bit microprocessors into the multicore powerhouses we use today.

Sponsored: Blade Servers Cut IT Costs

IDC study finds a high correlation between blade platform adoption and lower per user infrastructure costs among a wide range of businesses.

Develop These Soft Skills to Build for IT Success

Be sure to develop basic workplace skills in communication (both written and verbal), people and process management, and so forth.

What Can Enterprise Tech Expect From Obama's Re-Election?

The 2012 presidential election’s implications for IT over the next four years.

Slideshow: Rugged Tech for the Enterprise

Here are 17 examples of toughened-up gear that can survive military field operations and office park party fouls.

An Illustrated Guide to Windows 8 Enterprise Security Features

Windows 8 is packed with security features. Jump into this slideshow to see what’s under the hood.

Western Digital Acquires Backup Company Arkeia

Arkeia is a developer of backup appliances and network backup software that is available for more than over 200 platforms.


Dell Quest Survey shows Worldwide Outlook on BYOD Strategies

Majority of companies surveyed believe they'll improve work processes if they implement a Bring Your Own Device strategy.

Sponsored: Converged Infrastructure Transforms IT

Businesses deploying technologies in integrated solutions that more tightly align and even accelerate the value of information technology to help drive better business results.

Recent Articles

A Guide to Key iPhone and iPad Data Protection Features

The latest iOS release, version 6, includes a set of more granular security and privacy permissions for users.

Sponsored: Scaling Out with Converged Networks

Networks need to be simpler, flatter and more capable of meeting the high-scale demands of dynamic workloads.

Slideshow: Hottest IT Certifications for 2013

The names and providers of extremely interesting and potentially valuable IT certifications for professionals to ponder.

From Help Desk/Admin to the Cloud: Getting There in IT

A recent graduate finds jobs scarce, but he is by no means devoid of prospects.

Sponsored: Converged Clouds Empower IT

The cloud a key component of enterprises ability to gain unconstrained access to information and IT resources. 

Mind the Gap: IT - The Times They Are A-Changin

In the past, IT has been the gatekeeper to technology for the business, mainly because we were the only people who lived it every day. That is no longer true.

A Looming Question of Location: IT Cert Exams in the Testing Center Vs. Online

Widespread requirement that candidates travel to a test center limits the uptake of certification exams.

Sponsored: Converged Clouds Empower IT

The cloud is a key component of enterprises ability to gain unconstrained access to information and IT resources.

Video: M2M Communication - The Rise of the Machines

Technology that enables the communication between two devices over a cellular network to collect and analyze data and more.

Slideshow: 15 Ways to Improve Data Quality for Analysis

Analyzing business data can lead to insights about your business but poor quality data can undermine your efforts.

More Recent IT Features & Blogs

A Guide to Justifying Information Security Investments

Sponsored: Converged Storage Reins in Big Data

APT: How to Defend Your Network Against Advanced Persistent Threats

Floating Point Accelerators: Does IT Finally Get A Free Lunch?

Making It in IT: Advice for a Veteran IT Pro Without a Degree

Why You Should Avoid “Brain Dumps” When Preparing for IT Certifications

How Cloud Computing Has Advanced Over the Years

How to Use File History on Windows 8

Amazon Web Services Now Supports Microsoft's Windows PowerShell

NTT Docomo Announces Global M2M Platform

Less and More: A Buyer’s Guide to 4U Servers

A Behind the Scenes Look at Beta IT Certification Exam Scoring

Trend Analysis: Cloud and Mobile Device Security

Public Clouds: Matters Of The External Connection

Recent IT Slide Shows

Slideshow: The Ten Most Influential People in IT

Slideshow: Essential Open Source Tools for the System Administrator

Slideshow: Top Ten Major Security Breaches of 2012

An Illustrated Guide to Making the Move to 10 Gigabit Ethernet

Slideshow: Essential Proprietary Network Admin Tools

Slideshow: Top Paying Technology Jobs by Position

An Illustrated History of Hacking Through The Years

Slideshow: Gadgets for the System Administrator's Toolbox

Slideshow: A Guide to Trading Your Laptop for a Tablet

Cloud Acronyms Illustrated: SaaS, PaaS, IaaS, and More

Slideshow: Intel Processors Over the Years

An Illustrated History of Hacking Through The Years

Slideshow: Horrifying Data Center Disasters

Slideshow: Top 10 Cities for IT Jobs

Slideshow: Intel Processors Over the Years

Slideshow: Nine Free Security Tools for Site Owners

Slideshow: The Top Tech Conferences for IT

Slideshow: Server Processor Milestones

Slideshow: The History of the Data Center

More Recent IT News

James Alan MillerJames Alan MillerJames Alan Miller is Managing Editor of Tom's IT Pro. He is a veteran technology journalist with over seventeen years of experience creating and developing magazine and online content. Founding editor of numerous business and enterprise computing sites at the internet.com network, James headed up the After Hours section at PC Magazine, as well as hardware and software sections of various Windows publications.

See here for all Tom's IT Pro articles written by James.

Recent IT Videos

VIDEO: How Secure Are Your Mobile Devices?

Enterprise mobile devices are proliferating like rabbits in the spring. Rachel Rosmarin tells you how to keep them under control.

VIDEO: Big Data, Big Hardware, Big Software

As data grows so must the hardware, software and access tools to give it meaning.

VIDEO: Quick Look - Intel S2600CP Motherboard

A 3D fly-through of Intel's S2600CP 

VIDEO: Quick Look - Intel S2600IP Motherboard

A 3D fly-through of Intel's S2600IP motherboard.

VIDEO: Data Center Convergence

Everything you need to know about the new data center.


Comments