Articles - Page 3

LTE Will Use Unlicensed Spectrum, But How?

17 Nov, 2015

LTE evolved in a rarified environment in which telecom companies pay for the spectrum. It’s theirs, and there is no need to play nice.

...More >

IT Business Edge 2016 Editorial Calendar

09 Nov, 2015

This is a calendar of special topics that will be covered on IT Business Edge in 2016. Our coverage will not be limited to these topics.

...More >

The Automobile Industry: Connecting to Trouble?

29 Oct, 2015

At this point, the biggest challenge may not be from the type of highly targeted hack that the news sites are portraying. It could be hackers taking a blunt-force approach.

...More >

How Organizations Are Approaching National Cybersecurity Awareness Month

20 Oct, 2015

Security executives at Zuora, CDK Global and Baylor University talk about how they're raising cybersecurity awareness in October and year-round.

...More >

The Long Transition to IPv6 Passes a Milestone

19 Oct, 2015

The exhaustion of ARIN’s IPv4 addresses doesn’t materially change anything, but it is a sign.

...More >

HTML5 Looks Good in Light of Google, Facebook and IAB Moves

22 Sep, 2015

The value proposition of HTML5 is that it performs tasks within its basic functionality that in the past required users to download and install plugins.

...More >

Tablet Sector Growth Pushed and Pulled by Business, Consumer Trends

14 Sep, 2015

It’s a bit of a cat and mouse situation: Consumer patterns make vendors reluctant to spend money on designing and manufacturing innovative new tablets.

...More >

Patient Health Care Apps: Chaotic Marketplace Blurs Benefits

24 Aug, 2015

Experts say the difficulty in enabling unrelated patient mobile apps to work together, along with other inefficiencies, suggests that a tremendous amount of integration and development work remains.

...More >

Apps for Health Care Providers: First, Do No Harm

17 Aug, 2015

Practitioners and IT departments must work together to find the applications that go beyond glitz to actually solve a problem or fill a need.

...More >

Find the Intersection of Machine Learning and IT Security

10 Aug, 2015

Observing patterns across the entire network to correlate and detect access and data patterns is hard to do manually for a human observer. Collecting and analyzing data using machine learning is far more effective.

...More >
Pages:   « Prev12 | 3 45Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.