When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. More >
Avoid falling for social media pitfalls of sharing and trusting too much. This is a time when a little skepticism and being wary can go a long way toward protecting your personal and organizational information. More >
Online communities are driving competitive advantage for many business-to-business (B2B) firms. More >
Even if you don’t have a computer, the nightly news bombards you with tweets from the candidates and anyone who has an opinion about the candidates. More >
There are positives and negatives associated with repositioning a consumer product for business, especially one as popular as Facebook. More >
In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. More >
When registering domains, should we forego the likes of .com, .org, and .net, and adopt generic extensions that are becoming increasingly common?More >
Temporary brick-and-mortar extensions of online retail outlets pop up in various locations to give those retailers a means of providing a touch-and-feel experience to customers.More >
More companies are demanding cloud-based services that are global, but also physically co-located with their regional offices.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
In one version of the future, the IoT will collapse into a series of unconnected or semi-connected islands with varying degrees of functionality and security.More >
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...
This report lays the foundation for a rational approach to software metrology, with the scope of the current effort being ...
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...
This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements....