Business stakeholders, designers and developers can keep track of an app's UX throughout a project lifecycle.
Move will will add enterprise mobility capabilities to Red Hat's JBoss Middleware and OpenShift Platform-as-a-Service (PaaS) offerings.
Developers and rogue enterprise users can cause problems.
Pivotal Software is capitalizing on last year's acquisition of mobile development firm Xtreme Labs with the recent announcement of Pivotal CF Mobile Services.
Gartner and IDC analysts provide tips on how to succeed in the new mobile world.
Companies emphasize bringing Big Data analytics to iPhone and iPad users.
Salesforce Wear Developer Pack provides sample apps for glasses, wristbands, smartwatches and more.
To generate interest in its enterprise-class Watson supercomputer platform now being offered as a service, IBM is encouraging mobile app developers to harness its "cognitive computing" power in a developer challenge contest.
You can survive support tasks with some careful planning. These tips can help.
Mobility strategy teams in the enterprise will need to keep on top of these three major trends in 2013 as they develop the most effective strategies to best tailor their company’s mobility goals.
We look at impact of mobile, cloud, big data, and social media on IT in 2012 and how the technologies will be important in 2013.
Data center managers must anticipate the emergent trends of social, mobile, and cloud and facilitate a collaborative work environment.
Cloud computing, mobile applications, and big data coalesced in 2012 and will shape IT in 2013 and beyond.
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
How a team of five university students developed a cross-platform, mobile, real-time app for managing presentations with no mobile development training.
From BYOD to social media, the trends that are keeping security administrators on their toes.
With the proper process controls, you can now allow access for any class of device and "future proof" yourself from what comes next.
These 6 action steps will help you get the most from outsourcing your remote infrastructure management.
Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.
Most shops don't yet sanction bring-your-own-device, but it's likely they will in the long term.