Wrapping up this week in tech, mobile developers aren't moving as quickly as hoped, DOCSIS 3.1 soon to be certified and voice recognition use increasing. More >
Security controls need to be put in place to protect cardholders' confidential information all the way through the transaction process. More >
Before an organization makes the jump to the new 802.11ac standard, there are a few excellent points to consider--and it may be that you just don't need it right away. More >
Robotic hardware combined with cognitive intelligence and cloud computing capabilities signifies a host of new opportunities across many industries. More >
Apple is not perfect in its approach to keeping devices and data safe. In some cases, the problem isn’t Apple itself – it’s the tendency of employees to disregard security. More >
If we were talking exposures for the PC platform and a similar dearth of tools, this class of product would be seen as critical to the security of the firm, but that doesn’t appear to be the case. More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.More >
Cybersecurity Ventures recently announced their Q3 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.
Jeff Bezos seems to have on blinders. The New York Times' expose on the internal environment at Amazon should be a huge wake-up call for him instead.
IT Business Edge's Paul Mah looks at the final version, and highlights a number of features that should make you love Windows 10.
Robotic hardware combined with cognitive intelligence and cloud computing capabilities signifies a host of new opportunities across many industries.More >
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...
This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings....