IT staffers at all levels are now tasked with managing data storage. They demand simplicity (but want power, too)
Researchers find gaping holes in security drilled to make phone-makers' own apps work
Economic pressure from world's most sensitive superpower to blame for diplomatic silence
German researchers have cracked the latest generation of smart swipe-card authenticators
But IT pros who try to secure mobile devices in a big company face three big conceptual problems
IT can create a virtual desktop accessed easily by an end-user in the office at a traditional PC or a remote worker on a mobile device
We survey the cloud's effects on nine classes of IT jobs: Architects and sys admins win, middle managers and tech specialists lose -- what about you?
Here are five creative ways IT can meet business users' needs and keep the enterprise secure in the age of cloud computing
As end users bring in their own technology, IT's focus shifts to managing the core data and the access to it
Buying habits are trending away from individual servers and toward integrated infrastructure packages