The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work. More >
News this week included encryption pressure from Mozilla, sliding tablet sales, rural broadband, happy days for Samsung, and quantum computing breakthroughs. More >
The idea of pushing 5G as a landscape in which conditions are created where a universe of as-yet-undefined services can be established and flourish puts less pressure on the industry. More >
The bigger story is that this isn’t just a new set of products. This is a new Microsoft, blending what it was with what it wants to become to change computing as we know it. More >
An entrepreneur who's been designated as one Stanford grad who might change the world is working on a wearable device to capture and analyze health data. More >
Employees have bad password habits at home and that can still affect the workplace. But how can we ensure better password management? More >
The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.More >
An entrepreneur who's been designated as one Stanford grad who might change the world is working on a wearable device to capture and analyze health data.More >
Owler, a data services company, revealed a survey of 8,000 professionals that showed that the majority of engineers have strong opinions about Apple and its watch.More >
Cybersecurity Ventures recently announced their Q2 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.
The IoT will create a ton of information, which is precisely what Big Data is designed to handle.
If you look a little deeper, you'll find a group of lesser-known skills that are gaining momentum and popularity with employers.
Since most standard security measures do not block DNS traffic, cyber criminals are able to infiltrate networks and gain access to proprietary data.More >
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...
This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings....