The reality is that fragmentation is a bigger deal in the enterprise than the consumer sector. More >
In a world where boards seem disengaged and clueless, Microsoft’s board stepped up and made the perfect choice in a CEO. Today was a showcase of what can result. Microsoft has gone from treading water badly to contending for leadership again. More >
New approaches should be important to IT and security personnel as ad blocking increases. More >
Developers need time-saving tools to help reduce the time to market. Here are five ways to build a successful developer ecosystem around your APIs. More >
Mendix CTO Johan den Haan says that while its RAD tools have been widely adopted to build Web applications, with the release of Mendix 6, both citizen and professional developers can now easily construct mobile applications. More >
News this week included general availability of GE Predix for data analytics, a large Android vulnerability, Nest's Weave application layer and quantum computing. More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.More >
In their fourth year, the Tabby Awards are introducing a new category specifically for the best business smartphone apps -- the Mobby Awards/Business.
Riverbed CTO Hansang Bae says that rather than requiring IT to deploy and manage complex infrastructure inside the branch, Project Tiger will become the foundation through which storage and security services are provided in the branch office.
Everyone wants to do great things, but few actually do. Why? Most people are either afraid to think big, believe they don't have what it takes, or don't want to commit to putting in the kind of effort required to accomplish anything truly great.
Security experts can take steps to bridge the gap and help to reinforce best practices among their colleagues.More >
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...
This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings....