Month: June 2014

Considering the development of mobile devices

The way we think about our mobile devices might be shaped by what we use them for. These days, that seems to be more and more about data.

Continue Reading

Scam popup ad exploits fear of Java unreadiness

Lax Java security can open your system to viruses. 

Continue Reading

Your company can’t fight BYOD—and doesn’t have to

Is BYOD inevitable?

Continue Reading

Choosing the right mobile initiative for the office applications that you use

Microsoft programs can be a template for software, even if they aren’t being used.

Continue Reading

Offer a stronger alternative to public WiFi

Remote access and work from home policies might seem like a good idea, but they can also lead to a loss of data if proper protection policies are not followed.

Continue Reading

Battle of the mainframe providers: Hewlett Packard and IBM

HP has plans to enter into the high-speed computing field.

Continue Reading

Microsoft committing to email security

Microsoft seems to be making an effort to recommit to security. 

Continue Reading

The details on the Amazon Fire Phone

We have more concrete information about the Amazon phone.

Continue Reading

What the new iOS versions might have to say about chatting

iOS is developing an emphasis on screen sharing when it comes to messaging.

Continue Reading

Be realistic about cloud conversion demands

Distrust seems to persist between European and American cloud users.

Continue Reading