Mobility

Articles

Wearables in the Enterprise Take Different Path than BYOD Predecessors

The top-down approach that will ensure the success of some wearables in the enterprise is becoming more apparent daily. Here's why. More >

Hotel Wi-Fi Vulnerability a Reminder About Security Risks on the Road

No one should assume that the Wi-Fi they are using is secure, including (perhaps especially) in hotels. More >

HP Applies Big Data Analytics to Mobile Testing

HP is now looking to put a little distance between itself and providers of rival testing platforms that don’t have access to same level of depth and breadth in Big Data analytics. More >

What to Consider Before Taking Your SMB Global

Though it may seem easy to break into the global market, doing your homework upfront will help eliminate potential headaches. More >

Decision on Comcast’s Time Warner Cable Acquisition Not Likely Until Summer

News this week included the state of mobile apps, Comcast's acquisition, the LightSquared saga, biometric security and broadband speeds. More >

Five Ways Smartwatches Will Change E-Commerce

Smartwatches will change e-commerce as we know it, whether it's through altering the face of consumer data, miniaturizing the act of consumer engagement, or changing the way we pay for things. More >

More Articles >

Interviews

BYOD, Wireless Drive Network Complexity

The explosion of wireless devices has increased the number of devices workers use at home and at work. Ankur Chadda discusses the implications this has on the enterprise.

More >

Protect Data or Device? The Key Choice in Securing Mobility

Focusing on the device inconveniences users and doesn't work.

More >

Controlling the Mobile Transition

BYOD (bring your own device) is a well-established trend. The next steps are to redesign business processes as mobility takes root and implement a “buy the right device” program.

More >

More Interviews >

Most Popular Features

Resume Cleanup: Sixteen Items You Should Remove Today

You have six seconds to make a great first impression. Go! Recruiters don't give much time to resumes, so it's essential that yours is on the mark.

Dell, VMware, NVIDIA Use Tesla Model to Change Personal Computing Forever

The three vendors are targeting the correct customer group for the first ISV-certified virtual workstation appliance solution.

Fourteen Android Apps to Help You Get the Job Done

With to-do lists that grow longer every hour, it's essential that we work smarter and more efficiently to keep up with the demands of everyday life.

Editor's Choice

Top 30 Oddball Interview Questions in the U.S., UK and Canada for 2015

Security Staffing

Once again, Glassdoor has combed through tens of thousands of interview questions shared by job candidates over the past year to find some pretty spectacular oddballs.

 More >

Puppet Labs Extends IT Automation Reach

Bringing Order to the Cloud

G.fast Coming Faster and Faster

Think Data Ethics Don’t Matter? You’re Wrong

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Mobile45 Vetting the Security of Mobile Applications

The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...

mobile30-290x195 Guidelines on Mobile Device Forensics

This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...

HealthCare01 Wi-Fi Enabled Healthcare

This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings.

...

mobile9-290x195 PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud

This excerpt from chapter four focuses on using PhoneGap Build, including beginning steps, creating builds for different m...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date