Mobility

Articles

Why SMBs Should Consider VPNs for Secure Network Access

Once seen as a security solution for enterprise network access, VPNs are becoming a solution that even SMBs should consider for accessing data outside the company's walls. More >

The Success and Struggles of TV Everywhere Service

Tech news this week includes a report on the TV Everywhere service, Android OS goes to work, brain-to-machine sector growth, and Wi-Fi Sense woes. More >

HTML5's Rise Marked with Confidence and Some Security Concerns

HTML5 has proven to be an attractive platform for developers, but it is not without its faults. More >

Windows 10 Musings: Competition and Long-Term Strategic Opportunities

With the release of Windows 10, Rob Enderle speculates on Microsoft's next moves as it tries to break ahead of its competition. More >

Stagefright Reveals Android’s Biggest Security Flaw

A new Android vulnerability can be triggered just with your phone number and highlights the slow, difficult task of patching affected Android phones. More >

Windows 10 on Mobile: 10 Things IT Admins Need to Know

Windows 10 comes with a number of benefits that will enable enterprises to seamlessly manage smartphones, tablets, PCs, and other devices. More >

More Articles >

Interviews

Appster Exec Shares Insights on Smartwatch Prospects

An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.

More >

Global Employee Study Guides Dell’s Flexible Workforce Strategy

Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.

More >

Study by Dell, Intel Sheds Light on Employees’ Technology Adoption, Expectations

The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.

More >

More Interviews >

Most Popular Features

Vendor Risk Management: Ten Frequently Asked Questions

As cyber threats become more sophisticated and complex, businesses need not only to ensure they are secure, but also that their vital partners, suppliers, and vendors are protecting themselves as well.

Intel and Micron Just Made Every Tech Device You Have Obsolete

Intel and Micron just announced a new memory technology, 3D XPoint, that has the capacity to render many devices we use obsolete.

Email Habits that Contribute the Most to Email Time Suck

Assuming that your average annual cost per employee is $50,000, the time spent with email is costing your company $60 million every year!

Related IT Downloads

Global13-190x128.jpg Considerations for Identity Management in Public Safety Networks

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...

Mobile45 Vetting the Security of Mobile Applications

The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...

mobile30-290x195 Guidelines on Mobile Device Forensics

This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...

HealthCare01 Wi-Fi Enabled Healthcare

This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings.

...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date