Mobile Apps Remain Vulnerable For Months
Developers are failing to respond quickly to reports of security flaws, Trojans are infecting corporate devices at an alarming rate, and even mundane data about your device's power consumption could threaten your privacy.
7 Emerging Technologies IT Should Study Now
Staying on top of current technologies means anticipating future ones. Here, we look at seven technologies IT should be studying right now. One (or more) of these may well be the next big trend in the industry.
Ubuntu Smartphone: Small Player Debuts In A Big Game
Following a failed crowdfunding effort, Canonical is ready to release the first smartphone based on its popular Ubuntu Linux distribution. Can it compete against the likes of Apple iPhone and Android devices?
The Value Of IT In The 'We Economy'
Accenture sees the boundaries between industries dissolving as connected devices proliferate. How will this change the value proposition for IT in your organization?
Google Glass Killed: For Now
The Google Glass Explorer Program is shutting down for now, but this isn't the end of the company's plans for Glass or wearable computing.
Apple Is Not Charlie
Apple seems blind to the irony of selling an app that supports free speech when it does not do the same.
Cuba Calling? Not So Fast...
Lack of infrastructure and enterprise communications capabilities will make a tough go for companies interested in taking advantage of loosening restrictions.
Web Becomes Less Free
Censorship, lack of privacy, and other ills threaten the health of the Web, says World Wide Web Foundation.
Public Safety Communications: Time For Convergence
First responders need a better blend of reliability and multimedia capability. Until a dedicated 4G network is implemented, a blend of networks, devices, and applications should drive future procurements.
Senate Explores Outsourcing Security Services
The US Senate might outsource core cyber security support to a managed security service. Candidate tasks include network security monitoring, threat analysis, incident reporting, vulnerability analysis, and security engineering and research.