More

    Carl Weinschenk

    Carl Weinschenk Carl Weinschenk Carl Weinschenk is a long-time IT and telecom journalist. His coverage areas include the IoT, artificial intelligence, artificial intelligence, drones, 3D printing LTE and 5G, SDN, NFV, net neutrality, municipal broadband, unified communications and business continuity/disaster recovery. Weinschenk has written about wireless and phone companies, cable operators and their vendor ecosystems. He also has written about alternative energy and runs a website, The Daily Music Break, as a hobby.

    Explore

    Biometric Security’s Promise – and the Challenges It Faces

    Reduce Data Breach Damage by Improving Detection and Response Biometrics is said by some to be an answer to...

    2015: A Phabulous Year for Phablets

    5 Mobile Development Trends for 2016 It is understandable to see significant ebb and flow in the mobile sector...

    Smartphone Sales Shrink

    Something happened at the end of last year that hasn’t occurred since early in 2012: Smartphone sales declined, according...

    Do You Prefer Your Reality Augmented, Virtual or Altered?

    6 Devices Poised to Disrupt Your Network in 2016 Augmented reality (AR) is perhaps the coolest technology out there,...

    Is Telecom Capex Beginning to Rebound?

    2016 Business Communications: Changing the Way We Work A few weeks ago, I posted on uncertainties that persist about...

    Autonomous Vehicle Technology Not Yet Accepted

    Eleven Gadget Gifts for Travelers People are not yet comfortable with the idea of the self-driving, or autonomous, vehicle,...

    Siemens, IBM Marry Building Management, IoT

    2016 Business Communications: Changing the Way We Work Siemens Building Technologies and IBM said that they will merge the...

    Vertical Systems Group Releases Carrier Ethernet Rankings

    5 Mobile Development Trends for 2016 Vertical Systems Group today released its influential rankings of Carrier Ethernet providers. The...

    Verizon: Mobile Breaches Cost More than $9K Each

    The Human Factor: 5 Security Blunders People Keep Making The issue of mobile device security is huge, complex and...

    Drones Looking at LTE, 5G

    6 Devices Poised to Disrupt Your Network in 2016 The age of drones is here. The next evolution is...

    Gartner: Android and iOS Almost the Whole Smartphone OS...

    Gartner research says that smartphones had a good late 2015. The firm estimates that 403 million smartphone units were...

    What Is the Best Way to Secure Endpoints?

    Security Artifacts – The Hunt for Forensic Residue During the past decade, while security threats have evolved quickly, the...