Search

Filter:

Search Results

Reining in BYOD expenses

use, allowed devices and operating systems, approved carrier service plans and terms for expense ...

Firms still hemorrhaging from Heartbleed

was vulnerable at the time) and use them to login via a VPN," the blog relates. Heartbleed continues to pose ...

VMware acquires CloudVolumes, Windows' answer to Docker containers

to storage locations by the type library. And the System Registry--that huge database of links--maintains all ...

CenturyLink now offers a more public, private cloud

of the design model that CenturyLink currently uses to build its U.S. data centers. Related Articles: ...

IDC: The return of 4GLs to compete against both Web and native

"Mobile is a net-new disruptive force, and it is being used as a galvanizing force to re-think application architectures and how app dev is evolving," he responded. "It is used as a catalyst for change towards ...

Utah leads state governments in mobile-friendly strategy

As evidence, Fletcher notes that the state's websites received 1.63 million unique visitors in June, 26 percent of which came from mobile devices. As Americans increasingly use mobile devices, Utah's lead ...

Shadow IT can obscure BYOD security risks

which means there are few controls over its use. Such a Wild West environment opens up the enterprise ...

Injunction sought against Aereo would set cloud service precedent

"Retransmitting a television program using user-specific copies is a 'process' of transmitting ...

News Scan: UPS Stores announce major breach; Tech advancements drive and disrupt businesses; More

and using the same passwords across multiple sites and devices." (Read more on passwords ...

Wells Fargo picks mobile banking-related startups as first participants in accelerator program

of the projects focus on using mobility to enhance transaction security. Zumigo, one of the startups in the program, uses location tracking to ensure you are indeed the one accessing your bank account. Built ...