How Allstate Uses Mobile Data To Enhance Customer Experience
Allstate had to stretch its organizational muscles to bring Drivewise Mobile to market. In the process, the company brought together a cross-functional team that included assorted IT disciplines and business professionals with competencies in consumer relationships, insurance products, and user experience.
Podcasts, Presentations: Help Your Users Improve Quality
Our hands-on demo of the iRig Mic Studio shows a tool that can help your users make better podcasts and video presentations. It's a toolset that will allow trainers, executives, sales, and marketing professionals to put a studio in their backpacks and create good recordings from almost anywhere they happen to be.
Electronic Warrantless Surveillance: What IT Should Know
Today, in the name of public safety, federal and local government agencies are piling up advanced technologies to monitor people, with little regard for the basic principles of privacy. Here's what businesses and individuals need to know.
10 Mobile Games To Ease Your Commute
As summer draws to a close, we highlight 10 recent and upcoming mobile games that will help you ease back into your hectic worklife and face the fourth quarter with a smile.
Intel CEO Sees A Bright Future For IoT, Developers
Tiny computers, real-time depth sensing, and breakthrough memory technology are among the innovations featured at this year's Intel Developer Forum. CEO Brian Krzanich detailed how connected devices will change the way we all do business.
7 Hot Advances In Email Security
Despite gaping security holes, email is too entrenched in business communications to go away. Consider these 7 ways to bolster email security and help IT admins sleep easier at night.
Apple TV Streaming Service Delayed Until 2016
It looks like an important part of Apple TV's revamp has been delayed. Media conglomerates and Apple are stuck in place after months of negotiation rights to streaming live TV to Apple customers.
Keyless Security Not So Secure
A suppressed security paper shines a light on the shortcomings of the cryptography used to protect keyless vehicle access systems.