Search

Filter:

Search Results

Demand for data analysts at record levels

strategy-focused activities." The right balance of hard and soft skills It's a similar story at the North ...

Reining in BYOD expenses

that most telecom expense management suppliers offer monitoring and analysis services for wireless service ...

Wearable band shipments soared 684% in the first half of the year, says Canalys

related to wireless charging, waterproofing, and display and battery technologies. For more:- check out ...

Researchers successfully hack into traffic lights, take over controller

at Ars Technica Related Articles: The WiFi Pineapple makes it easy to hack wireless devices Home router ...

Firms still hemorrhaging from Heartbleed

a grave security risk to firms. According to a study by security firm Venafi release in August, ...

Get a room with a mobile app; 6 best tablets for working;

Get a room with a mobile app >> Get a Room: Last-Minute Hotel-Booking Apps Compared (Re/code) 6 best tablets for working >> The 6 Best Tablets for Getting Work Done in 2014 (PCWorld) Microsoft, Tracfone partner on mHealth >> Microsoft, Tracfone Partnering on mHealth Solution (Wireless ...

Colleges and universities among highest risk for data breaches

2014. Among the study findings: Colleges and universities score around 600 collectively ...

Europe v. Facebook; TV vs. FCC

FCC wireless spectrum auction [eWeek] And Finally...  The folly of public meetings [ZDNet] ...

Shadow IT can obscure BYOD security risks

Blocking or ignoring BYOD can cause employees to take matters into their own hands, resulting in shadow IT that can pose security risks for the enterprise. That is the observation of CBR in an article entitled "How Blocking BYOD Leads to Shadow IT." CBR cites an Ovum study that found 70 percent ...

New phishing scam highlights vulnerabilities of Bitcoin

The cybercriminals likely culled addresses from around 12,000 messages sent from listservs of known and active ...