Search

Filter:

Search Results

News Scan: T-Mobile backtracks on cramming charges; Wearables will clog Internet; more

collected from wearable wireless devices into an ecosystem of multiple players," says Jonathan Collins, ...

4 next-gen Ethernet specifications in development for data centers, the enterprise

is simple: Newer " Wave 2 " 802.11ac wireless networks will face a bottleneck if deployed ...

FBI may have to accept encryption; State CIOs won't accept security holes;

 [eWeek] And Finally...  You know, somebody should do a story about standing in line for hours at a rental ...

US adults fear identity theft more than being shot or speaking in public

to encourage the nearly 75 percent who are unprepared for catastrophe. We are conducting follow-up studies ...

Workers reveal their own concerns over BYOD security

report "The Rise of the Identity Centric Economy." The firm shared highlights of the study in an email to FierceMobileIT. The study asked 1,074 U.S. employees across a range of industries ...

IP phones may get productivity boost with Asterisk 13 upgrade

naming tables. "There were a whole lot of complex architectural reasons inside of Asterisk 12 why ...

Tech firms form new security alliance, while new study details carding black market

period to $12.7M [FierceITSecurity] ...

A brief history of malware

ever malware attacking the Mac OS X, was discovered. Jan. 17, 2007: Storm worm created one of the largest botnets in history. By June, it had infected 1.7 million computers. July 2007: The Zeus Trojan, ...

News Scan: IoT good for vendors; Tech icons star in new graphic novel; More

study While IT executives are evenly split on whether the Internet of Things is reality or hype, IoT ...