Smarter than Siri: Viv promises a truly intelligent assistant

August 15, 2014
AI's promise has been dangled for decades, but a startup founded by the creators of Siri may be poised to finally deliver
Read more »

Stroustrup: Why the 35-year-old C++ still dominates 'real' dev

August 15, 2014
C++ inventor details the language's latest changes and assesses the strengths and weaknesses of its competitors
Read more »

Blue Screen Stop 0x050 error reported for systems installing KB2976897, KB2982791, and KB2970228

August 14, 2014
Two Microsoft kernel-mode driver updates are triggering BSOD error message on some Windows systems
Read more »

Primed for mobile development, Mono upgrade focuses on performance

August 13, 2014
Mono 3.6.0, intended for Linux but picked up by mobile app developers, boosts performance and cuts memory usage
Read more »

Black Tuesday: Microsoft offers massive IE patch rollup but no ActiveX blocks

August 13, 2014
Initial reports also include puzzling behavior for some Start menu Taskbars, patches for some Surface tablets, and an underwhelming Win 8.1 'Update 2'
Read more »

Apple's Swift falls back to earth after initial surge

August 12, 2014
Apple's programming language dips in popularity after strong start, but is expected to even out in coming months
Read more »

McAfee sideshow eclipses Defcon's real security breakthroughs

August 11, 2014
The security pioneer's appearance at Defcon highlighted the best and worst impulses of the hacker community
Read more »

Get real: Oracle is strengthening -- not killing -- Java

August 11, 2014
While the company has done its share of bungling, it has put Java on a progressive track
Read more »

New Windows 9 rumors: Can the charms, clone the Desktop

August 08, 2014
Independently confirmed Windows 9 rumors have Microsoft dropping Charms Bar and adding 'virtual Desktops,' an obscure feature from XP and Win7
Read more »

Don't panic: That Russian hack bombshell isn't what you think

August 07, 2014
News of 1.2 billion stolen Web credentials raises key questions about the data -- and the motives of the security researcher
Read more »
©1994-2014 Infoworld, Inc.