Once seen as a security solution for enterprise network access, VPNs are becoming a solution that even SMBs should consider for accessing data outside the company's walls. More >
Tech news this week includes a report on the TV Everywhere service, Android OS goes to work, brain-to-machine sector growth, and Wi-Fi Sense woes. More >
HTML5 has proven to be an attractive platform for developers, but it is not without its faults. More >
With the release of Windows 10, Rob Enderle speculates Microsoft's next moves as it tries to break ahead of its competition. More >
A new Android vulnerability that can be triggered just with your phone number and that highlights the slow, difficult task of patching affected Android phones. More >
Windows 10 comes with a number of benefits that will enable enterprises to seamlessly manage smartphones, tablets, PCs, and other devices. More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.More >
As cyber threats become more sophisticated and complex, businesses need not only to ensure they are secure, but also that their vital partners, suppliers, and vendors are protecting themselves as well.
Intel and Micron just announced a new memory technology, 3D XPoint, that has the capacity to render many devices we use obsolete.
Assuming that your average annual cost per employee is $50,000, the time spent with email is costing your company $60 million every year!
Large data volumes drive the need for data lakes. Here are six tips on how a data lake can reconcile large volumes of data with the need to access it.More >
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...
This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings....