Mobile/Wireless


Apple-IBM Deal To Boost Enterprise Mobile Big Data Analytics

Companies emphasize bringing Big Data analytics to iPhone and iPad users.

Salesforce.com Claims First Industry Initiative for Enterprise Wearable Computing

Salesforce Wear Developer Pack provides sample apps for glasses, wristbands, smartwatches and more.

Watson Supercomputer Power Offered to Develop Enterprise Mobile Apps

To generate interest in its enterprise-class Watson supercomputer platform now being offered as a service, IBM is encouraging mobile app developers to harness its "cognitive computing" power in a developer challenge contest.

5 Sysadmin Holiday Survival Tips

You can survive support tasks with some careful planning. These tips can help.

Top 3 Emerging BYOD Trends for 2013

Mobility strategy teams in the enterprise will need to keep on top of these three major trends in 2013 as they develop the most effective strategies to best tailor their company’s mobility goals.

Top Technology Trends for 2013

We look at impact of mobile, cloud, big data, and social media on IT in 2012 and how the technologies will be important in 2013.

SoMoClo Driving Worksocial Enterprise

Data center managers must anticipate the emergent trends of social, mobile, and cloud and facilitate a collaborative work environment.



Top 3 Trends in IT and Big Data: A Look Back, The Year Ahead

Cloud computing, mobile applications, and big data coalesced in 2012 and will shape IT in 2013 and beyond.

Q&A: Keeping Mobile Applications Secure

How can you make sure your mobile applications are secure? A security expert offers several suggestions.

Q&A: Developing Mobile Apps at Drexel University

How a team of five university students developed a cross-platform, mobile, real-time app for managing presentations with no mobile development training.

Top 5 Enterprise Security Trends

From BYOD to social media, the trends that are keeping security administrators on their toes.

Going Mobile: Introducing Your Mainframe to Modern Tools

With the proper process controls, you can now allow access for any class of device and "future proof" yourself from what comes next.

How Remote Infrastructure Management Can Improve Processes and Increase Efficiency

These 6 action steps will help you get the most from outsourcing your remote infrastructure management.

Q&A: Addressing BYOD with Identity-Based Security

Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.

IT Not Yet Sold on BYOD

Most shops don't yet sanction bring-your-own-device, but it's likely they will in the long term.

BYOD and the Cloud: The Dilemma Facing IT

The bring-your-own-device movement is a warning to businesses that their core is about to get more complicated. What must IT consider right now?

Supporting BYOD with Strong Mobile Device Management Policies

How to make mobile device management a core part of your security management strategy.

IDC Forecasts Strong Growth in Mobile Workforce

In just three years, mobile workers will account for more than one-third of the global workforce.

Mobile IT: A Look Back, A Look Ahead

Mobile devices became targets just as more workers were connecting to corporate assets using their personal devices. What's ahead for mobile IT in 2012?

Mobile Device Management in 2012: More Challenges, More Opportunities

Mobile devices will be a way of life for your enterprise users. What changes in mobile IT can you expect and prepare for this year?