Mobile users are more likely to get themselves into trouble -- but not the kind you'd expect.
Google and Verizon issued a statement on U.S. broadband policy, describing an approach that would permit differentiated services.
Recommendations for making data safer that won’t decimate your IT budget.
Google is set to disrupt the mobile communications industry with its mobile operating system, according to Strategy Analytics.
IBM's System i has long been a trusted computing platform, but it's 24 x 80 column data layout is out of touch with today's Internet and mobile devices. Here's how to bring its data into the 21st century.
Mobile security products fared better than did the broader security market in a very tough 2009. Look for that trend to continue.
IT organizations are highly exposed to security breaches through their information worker's mobile devices.
From security issues to integrating heterogeneous devices, mobile device management is fraught with challenges.
CA’s chief security architect discusses the three key areas for security professional’s attention this year.
IT shops aren't doing enough to secure their cellular communications. This leaves them wide open to attack. The stakes are high -- and likely to get even higher.
What should IT focus on this year? Some key issues from 2009 remain, but several new areas will need IT's attention.
Security will continue to be a hot-button issue this year. Here’s how to protect your business-critical information.
The variety of mobile devices is growing, as is pressure on IT to support their growing mobile workforce. We offer tips to make IT's job easier.
Network management is more than just knowing if devices are operating properly.
Judging from this month’s flurry of new product announcements, BEA’s mainframe software business is alive and well
Is Microsoft’s come-to-software-as-a-service invitation sincere—or just a token gesture?
IBM, Google, and Microsoft ready to rumble for Web 2.0 supremacy
Are the days of fat client PCs -- Windows, Mac, and Linux -- numbered?
A new appliance acts as a meta-broker to the wild profusion of competing network access control schemes
If you think you’ve got a lot more on your plate these days, you’re probably right