Mobility

Articles

What's Next After the EMV Migration? Tokenization

Security controls need to be put in place to protect cardholders' confidential information all the way through the transaction process. More >

What to Consider Before Making the Move to 802.11ac

Before an organization makes the jump to the new 802.11ac standard, there are a few excellent points to consider--and it may be that you just don't need it right away. More >

Must-See Robotics at RoboBusiness 2015

Robotic hardware combined with cognitive intelligence and cloud computing capabilities signifies a host of new opportunities across many industries. More >

Apple Security in the Enterprise: Safer, Not Perfect

Apple is not perfect in its approach to keeping devices and data safe. In some cases, the problem isn’t Apple itself – it’s the tendency of employees to disregard security. More >

BlackBerry and WatchDox: 9/11 and Our Sadly Ironic Security Conundrum

If we were talking exposures for the PC platform and a similar dearth of tools, this class of product would be seen as critical to the security of the firm, but that doesn’t appear to be the case. More >

Patient Health Care Apps: Chaotic Marketplace Blurs Benefits

Experts say the difficulty in enabling unrelated patient mobile apps to work together, along with other inefficiencies, suggests that a tremendous amount of integration and development work remains. More >

More Articles >

Interviews

Appster Exec Shares Insights on Smartwatch Prospects

An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.

More >

Global Employee Study Guides Dell’s Flexible Workforce Strategy

Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.

More >

Study by Dell, Intel Sheds Light on Employees’ Technology Adoption, Expectations

The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.

More >

More Interviews >

Most Popular Features

Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their Q3 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.

Jeff Bezos’ Confirmation Bias Could Kill Amazon: A Teachable Moment

Jeff Bezos seems to have on blinders. The New York Times' expose on the internal environment at Amazon should be a huge wake-up call for him instead.

10 Features that Will Make You Love Windows 10

IT Business Edge's Paul Mah looks at the final version, and highlights a number of features that should make you love Windows 10.

Related IT Downloads

Global13-190x128.jpg Considerations for Identity Management in Public Safety Networks

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...

Mobile45 Vetting the Security of Mobile Applications

The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...

mobile30-290x195 Guidelines on Mobile Device Forensics

This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...

HealthCare01 Wi-Fi Enabled Healthcare

This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings.

...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date