Mobile & Wireless

IT Security: Malware Is Going Mobile Too
Malware proprietors are reaching mobile users with mobilized versions of Trojans and phishing.
802.11ac Wi-Fi: Coming to a Network Near You in 2012
The fifth generation of the Wi-Fi standard boasts up to three times the speed of Wireless N.
The Cost of Lost Smartphones Around the World [Infographic]
The mobile device of choice for many users is the smartphone, but its mobility also makes it prone to loss.
How the Instagram Cinderella Story Came Together [Infographic]
The photo sharing mobile application has sparked inspiration in the startup world with its $1 billion acquisition by...
PhoneSoap Promises to Sanitize Your Smartphone
Germs and bacteria on mobile devices get zapped by this in-development product.
iPhone Concept Art from 1983 Shows Apple Was Ahead of Its Time
Noted Apple designer Hartmut Esslinger dreamed up the iPhone long before it became a reality.
Looking for Jobs On a Smartphone [Infographic]
More job seekers are turning to mobile devices in their quest for employment.
How the New iPad Consolidates Your Hardware Needs [Infographic]
More than just a tablet, Apple’s new iPad is replacing multiple devices.
The Post-Plus Era Is Here: Mobile Devices Outpace PC Growth
The way modern users connect and communicate is causing a shift in device purchases.
The Father of the E-Mail Attachment Reflects on His Invention
Nathaniel Borenstein, inventor of the e-mail attachment, marvels at how far the Mime object has come.
Blink if You Want to Use Your Smartphone
Samsung tries a new twist to Android’s Face Unlock security system.
Seen and Heard: Location Tech Shines at Where Conference
As location-based tech heats up in social, mobile and local commerce, leaders and influencers in geospatial tech gather...

Security

Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
Tools to Maintain Mobile Sec... |
Far-flung devices pose serious challenges, but a variety of technologies can help protect...

Storage

The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...
The Value of Converged Infra... |
Improvements in security, management and efficiency are just a few of the benefits CI can...

Networking

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Hardware & Software

New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
The Tools That Power Busines... |
Ever-evolving analytic software can greatly improve financial institutions’ decision-...