Careers | News, how-tos, features, reviews, and videos
New containerization technologies can help BYOD initiatives succeed by creating separate spaces on smartphones for work and personal use
Security researchers propose methods to protect computers from being compromised via a new vulnerability in all versions of Java Runtime Environment 7
The list of what tablets can do is long and growing, but it's the list of what they can't do that's keeping most employees from using tablets as PC replacements
A techie gets the runaround from a mysterious user and close-lipped staff while troubleshooting a problem at a remote site
New offering addresses BYOD headaches by giving users secure, consistent access to apps and data from any device
Amazon's Werner Vogel notes that customers struggle with value of the cloud beyond TCO; here's how to figure it out
The malware installed in the attacks seen so far appears to be a variant of Poison Ivy, a remote administration Trojan program
Rod Hefford, CIO for Global Customer Development and Supply Chain at Unilever, discusses they key goals of their Compass strategy, how IT is organized to drive innovation globally
With these three basic guidelines, BYOD can work for everyone without unfairly burdening IT
U.S. employees may never be as accepting about BYOD's potential privacy violations, but American companies can learn a lot from China about better educating workers about security