News this week included encryption pressure from Mozilla, sliding tablet sales, rural broadband, happy days for Samsung, and quantum computing breakthroughs. More >
The idea of pushing 5G as a landscape in which conditions are created where a universe of as-yet-undefined services can be established and flourish puts less pressure on the industry. More >
The bigger story is that this isn’t just a new set of products. This is a new Microsoft, blending what it was with what it wants to become to change computing as we know it. More >
An entrepreneur who's been designated as one Stanford grad who might change the world is working on a wearable device to capture and analyze health data. More >
Employees have bad password habits at home and that can still affect the workplace. But how can we ensure better password management? More >
SOASTA CEO Tom Lounibos says the rate at which mobile applications are being built requires IT organizations to embrace a continuous testing methodology. More >
An entrepreneur who's been designated as one Stanford grad who might change the world is working on a wearable device to capture and analyze health data.More >
Owler, a data services company, revealed a survey of 8,000 professionals that showed that the majority of engineers have strong opinions about Apple and its watch.More >
CEO Tony Busseri pulled no punches in identifying what he sees as flaws in technologies that are widely used to secure mobile data.More >
If you look a little deeper, you'll find a group of lesser known skills that are gaining momentum and popularity with employers.
No one is managing the data.
When interviewing for a new position, it can be tough and at times nerve-wracking to try to divine if the potential manager's style and team would be the right fit for you.
Redis, an open source data structure server, has proven to be one of the most popular options with developers among a bevy of modern database options for speed and performance.More >
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...
This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings....