According to reports, Google is planning to release a laptop in the third quarter that will be driven by an OS that combines Android and Chrome. More >
Municipalities can demand different things of those wanting to deploy small cells. More >
An ordinance helps Google Fiber, Cisco makes a deal with Salesforce and the OpenDaylight Project has introduced Boron. More >
The long and winding road toward cellular carrier use of unlicensed spectrum took three steps this week. More >
The ability to persistently secure any file type across all sharing methods, devices, and storage locations is paramount. More >
Optimizing contact should be the only consideration when considering whether to go with a mobile website, a native app, a hybrid app or any combination of approaches. More >
The wearable device can be activated to sound an alarm and send out a location-based text alert in the event of an attempted assault.More >
There isn’t enough consumer interest for GPS technology to help safeguard kids.More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Regardless of the pace at which businesses adopt the IoT, ITSM will have to evolve to deal with IoT-driven changes such as more connected nodes, data points and automation, all of which add complexity.
A Korean-American whose family emigrated to the United States when she was five years old, Suh embodies what one hopes is the future of IBM.
Successful IT leaders have to have very specific skills, but still know how to run a team, meaning they must master the so-called soft skills that are not taught formally.
To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for.More >
In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing an...
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...