Articles

Digital Marketing for Small Businesses

09 Aug, 2016

Digital marketing is more than just an easier, cheaper alternative to big, high budget ad campaigns.

...More >

Bluetooth, Seeing IoT Growth, Seeks to Build on a Successful Standard

08 Aug, 2016

Bluetooth 5, married with the IoT, will revitalize this strangest of protocols, which manages to hide in plain sight.

...More >

IPv6 Is Safe, If Approached with Care

20 Jul, 2016

Whether IPv6 is dangerous or not depends more on the people running it than the addressing scheme itself.

...More >

Supply Chain Security Must Mimic Enterprise Security

21 Jun, 2016

With increased visibility to receive, analyze and respond to real-time data, supply chain managers are able to optimize inventory and to reduce costs. However, the devices and technologies, many of them mobile, that make the supply chain more efficient come with security risks.

...More >

The Enterprise Beckons as Age of Virtual and Augmented Reality Arrives

25 May, 2016

The increase in attention in VR and AR that is being generated by Oculus Rift and will be soon by other products will change the way business is done.

...More >

Drones and Security: Limitless Potential for Danger

10 May, 2016

Drones and security have an interesting relationship. Drones can be used to assist in physical security, and in national security efforts. But drones have been a threat to security, as well.

...More >

How Communities Are Using Smart Building and Smart City Technology

16 Mar, 2016

These 10 smart technology projects are helping to create better living through lower energy consumption, easier maintenance, real-time info sources and cost savings.

...More >

Why Mobile Apps Are Not Getting More Secure

27 Jan, 2016

The insecurity of mobile life has a variety of causes, ranging from technological shortcomings to user apathy, ignorance and naivety. The question is what can be done.

...More >

The IoT, IPv6 and DDoS: A Dangerous Mix

19 Jan, 2016

Experts say it's possible that the new addressing scheme, necessary to accommodate the explosion of wireless technology and the billions of IoT devices, will create a landscape that allows malicious hackers to launch potentially potent DDoS attacks.

...More >

Examples of Big Data Success: Making the Data Work to Solve the Big Problems

17 Dec, 2015

Three companies share their successful use of Big Data analytics in mobile, self-service data and health care.

...More >
Pages:   1 23Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.