Facebook, Google and others are getting creative with approaches to expanded Internet access in underserved and unserved areas of the world. More >
Microsoft understands that the success or failure of the new OS will, to a great extent, rest on how it does in the enterprise. More >
Over the last decade, technology decisions have moved back to being driven by line executives rather than IT executives. Gartner bases its predictions historically on conversations with IT. More >
News this week included smart lightpoles, 5G, bad news for municipal broadband, the scary side of the IoT, and licensed and unlicensed spectrum issues. More >
The infusion of personal devices, apps and networks into the corporate environment presents a significant security challenge, and is complicated by the presence of assets not fully under the IT department's control. More >
Something funny is happening in the robotic world: Robots are being accepted. More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.More >
With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks.
Fixing a CEO is easy. You either mentor them properly or replace them. But once a board goes bad, there is no easy recovery.
Cybersecurity Ventures recently announced their Q4 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.
Email is an integral part of working, but for far too many workers, it hurts rather than helps their productivity.More >
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...
This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings....