Gartner and IDC analysts provide tips on how to succeed in the new mobile world.
Companies emphasize bringing Big Data analytics to iPhone and iPad users.
Salesforce Wear Developer Pack provides sample apps for glasses, wristbands, smartwatches and more.
To generate interest in its enterprise-class Watson supercomputer platform now being offered as a service, IBM is encouraging mobile app developers to harness its "cognitive computing" power in a developer challenge contest.
You can survive support tasks with some careful planning. These tips can help.
Mobility strategy teams in the enterprise will need to keep on top of these three major trends in 2013 as they develop the most effective strategies to best tailor their company’s mobility goals.
We look at impact of mobile, cloud, big data, and social media on IT in 2012 and how the technologies will be important in 2013.
Data center managers must anticipate the emergent trends of social, mobile, and cloud and facilitate a collaborative work environment.
Cloud computing, mobile applications, and big data coalesced in 2012 and will shape IT in 2013 and beyond.
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
How a team of five university students developed a cross-platform, mobile, real-time app for managing presentations with no mobile development training.
From BYOD to social media, the trends that are keeping security administrators on their toes.
With the proper process controls, you can now allow access for any class of device and "future proof" yourself from what comes next.
These 6 action steps will help you get the most from outsourcing your remote infrastructure management.
Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.
Most shops don't yet sanction bring-your-own-device, but it's likely they will in the long term.
The bring-your-own-device movement is a warning to businesses that their core is about to get more complicated. What must IT consider right now?
How to make mobile device management a core part of your security management strategy.
In just three years, mobile workers will account for more than one-third of the global workforce.
Mobile devices became targets just as more workers were connecting to corporate assets using their personal devices. What's ahead for mobile IT in 2012?