Lenovo announced the release of WRITEit, a Windows 8 app that runs on a select group of Lenovo devices to allow use of a digital pen to input data. More >
This week in tech news, Nokia to acquire Alcatel-Lucent, HDMI 2.0 comes to monitors, and doctors still rely heavily on PCs. More >
Major carriers in the U.S. and abroad are now reporting increasing usage of the Internet Protocol version 6 (IPv6). More >
While we have much to accomplish in our quest for the mobile enterprise, many lessons have already been learned; lessons we can apply moving forward. More >
The Verizon report should be met with a certain amount of skepticism because painting a bright picture serves the carrier that makes its money based on its network being used. More >
Owler, a data services company, revealed a survey of 8,000 professionals that showed that the majority of engineers have strong opinions about Apple and its watch. More >
Owler, a data services company, revealed a survey of 8,000 professionals that showed that the majority of engineers have strong opinions about Apple and its watch.More >
CEO Tony Busseri pulled no punches in identifying what he sees as flaws in technologies that are widely used to secure mobile data.More >
The explosion of wireless devices has increased the number of devices workers use at home and at work. Ankur Chadda discusses the implications this has on the enterprise.More >
While many enterprises are clearly realizing promised benefits from public clouds, there are still challenges and a consistent set of concerns.
The code review, or in developer parlance, the pull request, is the number one way to set the tone, rhythm and bar needed to build a high-performing team.
Until recently, much of the industry has been focused on applying principles used to manage physical records but they are now realizing that records management is no longer a sufficient solution.More >
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...
This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings....