Search

Filter:

Search Results

To utilize IoT, enterprises need to overcome these obstacles

developers will get involved," he added. Second, enterprises need to address security issues posed ...

News Scan: Net neutrality becomes official; IT Budgets rising by 6%; More

their IT departments have all the right skills and knowledge to deliver in key areas, the article noted, citing ...

How to track your favorite whisky from factory to first sip

to the consumer who purchased the bottle. "Our collaboration with Thinfilm allows us to explore all ...

DataVault Mobile brings mobility (sort of) to the construction site

of the DataVault Mobile. "We're moving to 3D information, and you're not going to get ...

Itching to download Office on your Android tablet? Better check your chip maker

Android tablets have ARM processors and all Samsung Galaxy tablets do so if you're shopping ...

What's the big deal about Docker's new orchestration tools?

of containers could result in management headaches, which only get worse when working with distributed, ...

IT hiring challenges will continue in 2015

that can support a wide array of technologies. In a tight labor market, employers will have to consider all ...

Get ready for more cloud, mobile offerings from IBM

check out the Re/Code story- read the Wall Street Journal article Related Articles: IBM's new Verse ...

Apple crushing it in the enterprise

Think Microsoft's HoloLens, not Apple Watch Spotlight: Apple gets patent for mobile app data ...

Google nixes Pwnium hacking contest in favor of all-year-round prizes

the old system, a security researcher would have to pre-register, be physically present, and get a good time slot--since winners are determined based on a "first come, first serve basis--to get the prize. Being able to submit security flaws all-year-round certainly eliminates this problem. Another ...