Good Technology CEO Christy Wyatt says initially it was relatively simple to extend the application programming interfaces (API) exposed by Apple to deliver simple notifications to the Apple Watch. More >
Try keeping up with the relative merits of different approaches to development, emerging ways of customizing apps based on data gathered about the device’s user and, as always, the status of security. More >
The problem seems to be the lack of a clear strategy of prioritizing critical services first. More >
Tech news this week finds disparity among ISP throughput, optical network evolution, millennials embrace smart home devices and BYOD issues. More >
The biggest challenge for companies that want to develop for wearables is ensuring that quality matches user expectations. More >
Data has shown that 56 percent of websites either do a poor job of optimizing images or don’t do it at all. What can be done when optimizing images for websites and what should you avoid? More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.More >
Five technology and operational trends that will help corporate IT organizations deliver better business outcomes via the optimal use of technology.
LastPass has been breached. Again. For at least the third time now since 2011. At what point is something an anomaly and at what point is it a trend?
According to a new analysis of Dice salary data, the need for security professionals has translated into salaries for certain tech professionals that greatly exceed the baseline for tech-pro salaries.
Customer experiences can be improved through a number of methods including technology and innovation, customer service operations, employee management and global sourcing.More >
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...
This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings....