Articles

Can We Trust the Security of Mobile Payment Solutions?

04 Mar, 2015

Mobile payment options from Apple, Google and others each have their strengths, but users are slow on the uptake. Security and other concerns are to blame.

...More >

What’s Behind the C-Suite Disconnect on Risk

02 Mar, 2015

Culture, dysfunctional communication, and job function demands all contribute to an important disconnect on how to prioritize cybersecurity risks in the C-suite.

...More >

Success of the IoT Depends on Interoperable Standards

25 Feb, 2015

The experts are staying on the optimistic side when it comes to where standards are needed and how effectively they will be developed so that we can have this exciting IoT world.

...More >

Enterprise Apps Hangout: Applications and the Cloud

03 Feb, 2015

Cloud delivery of enterprise applications is the subject of an upcoming live Google Hangout.

...More >

Speed, New Demand from SMBs Mean Business Apps Set to Take Off

28 Jan, 2015

SMBs and departments are creating huge new pools of demand, and business app creation and updating are speeding up.

...More >

IT Business Edge 2015 Editorial Calendar

09 Jan, 2015

This is a calendar of special topics that will be covered on IT Business Edge in 2015. Our coverage will not be limited to these topics.

...More >

G.fast: A Powerful Weapon for Telcos

19 Dec, 2014

G.fast gives further life to the massive amount of legacy copper cabling that dominates the last mile of telephone networks.

...More >

Will Social Networking and Unified Communications Compete, Coexist or Cooperate?

26 Nov, 2014

It is entirely possible that the emergence of social networking is what ends up saving UC.

...More >

Microsoft, Google Help Create Ethernet Consortium for Clouds

01 Jul, 2014

Broadcom, Mellanox and Arista are other founders of the group that has developed a spec for 25GbE and 50GbE.

...More >

World Cup Spurs Cyber-Attacks, Digital Protests

17 Jun, 2014

Cyber-criminals use the quadrennial soccer contest as a phishing lure for unsuspecting victims, while Anonymous supports domestic protesters by defacing Web sites and by launching denial-of-service attacks.

...More >
Pages:   1 23Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date