Mobile devices will be a way of life for your enterprise users. What changes in mobile IT can you expect and prepare for this year?
From Windows on the mainframe (almost) to Big Iron and tablet growth, plus leadership changes at major tech companies and the passing of a trio of tech titans, it was an interesting year for IT professionals.
A look back at the leading mobility trends of the year, and three predictions for 2012.
Almost half of U.S. information workers already split time between home, office, or other locations
Kindle Fire tablet will sell for just $199.
The future is mobile. That's seemingly a given. What's less certain -- or less obvious -- is that the mobile future is now.
Mobile devices are bombarded by direct attacks and those designed for any Web-connected device. We explain best practices for end users and best practices for IT that can protect against these attacks.
Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.
Best practices for keeping mobile devices safe.
This year, demand for tablet computers will actually help lift worldwide IT spending.
Nine out of ten enterprises say they plan to invest in new endpoint security technologies to help them better manage mobile devices
As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.
This year could be a tipping point for enterprise mobile applications.
Organizations must be cautious to ensure they can manage their embedded devices as their population grows.
Best practices for protecting your mobile and enterprise assets.
A look at the top security, storage, and data center trends facing organizations in the New Year.
From powerful mainframes to small smartphones, it was a year filled with change and challenges, contradiction and contrast for enterprise IT.
Mobile users are more likely to get themselves into trouble -- but not the kind you'd expect.
Google and Verizon issued a statement on U.S. broadband policy, describing an approach that would permit differentiated services.
Recommendations for making data safer that won’t decimate your IT budget.