Many U.S. residents who have written the FCC to voice concerns about the move from copper-based telephone networks to Internet Protocol are concerned about the potential effects on health from mobile-headset radiation and what happens when the electricity goes out.
By Grant Gross | 17 April, 2014 04:23
Luckily, gadget-makers understand the cruelty of travel, and are always creating new devices that help the mobile worker/road warrior ease the pain of a hotel room with few outlets, or expensive in-room Wi-Fi. Here are three gadgets I've recently tested that can help you on your next trip:
By Keith Shaw | 16 April, 2014 03:14
Companies are engaged in a kind of arms race with competitors to see how many apps they can get everyone to use. But this aggressive push for more apps is going to end up giving users app fatigue.
By Mike Elgan | 12 April, 2014 21:20
Alternative titles like chief digital officer and chief technology officer muddy the situation and might even dilute authority.
By Paul M. Ingevaldson | 09 April, 2014 21:32
As enterprises add mobile users, virtualized services, and public and private clouds, they're running into constraints that threaten to limit their ability to scale their network infrastructure appropriately. Contrary to what many assume, the constraints are not so much bandwidth and cost, the real culprit is complexity.
By Dave Corley | 08 April, 2014 04:38
Too often we make self-limiting assumptions about position, status and the need to rigidly follow a career path.
By Paul Glen | 07 April, 2014 20:37
How can you have a business relationship management program that doesn't include input from the business units?
By Al Kuebler | 04 April, 2014 05:05
Premier 100 IT Leader Doris Peek also answers questions on the value of education and of learning about the business.
By Doris Peek | 04 April, 2014 03:01
For wearables to really take off, they will have to cannibalize the smartphone, just as mobile devices have cannibalized the PC.
By Jonny Evans | 02 April, 2014 22:19
Consumers will lead the charge to the Internet of Things, but enterprise adaptation will not be far behind. Will your IT department be ready?
By Jack Gold | 26 March, 2014 13:55
And what is going to have to happen before we see that we must set the smartest minds on coming up with newer, safer and less complicated security methods?
By Ron Miller | 24 March, 2014 10:37
We've seen pictures and videos of Motorola's round smartwatch. But the most important facts are still unknown, and Mike Elgan has a lot of questions.
By Mike Elgan | 22 March, 2014 11:09
The coffee purveyor has indicated it wants to move in that direction. But so do other companies, and they all have some hurdles to overcome.
By Evan Schuman | 18 March, 2014 12:08
Electronic tattoos are the ultimate wearable computer. There's no telling what a patch of electronics stuck to your body somewhere and connected wirelessly to a smartphone can do once app developers get involved.
By Mike Elgan | 15 March, 2014 11:03
The data transfer speed improvements that Seagate has made to their drives is remarkably impressive.
By Keith Shaw | 12 March, 2014 22:15
It offers slightly greater payment convenience, but at what cost?
By Evan Schuman | 11 March, 2014 12:08
To get your projects done, you'll need to motivate your people to perform, no matter where their loyalties lie.
By Paul Glen | 10 March, 2014 10:35
Every day, contemporary executives confront a series of inflection points, where received wisdom is no longer adequate.
By Thornton A. May | 10 March, 2014 10:35
And without remote management, getting patches onto devices scattered throughout the organization is hit or miss.
By J.F. Rice | 06 March, 2014 14:42
The notebook features a lightweight yet tough finish, and the latest tech specs; up to 16GB of memory; storage options up to 1TB hard drive or 256GB SSD; 802.11ac Wi-Fi.
By Keith Shaw | 05 March, 2014 23:13
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTContent StrategistNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTIT Support EngineerNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTOBIEE BI/DW ConsultantNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTDeliverability SpecialistNSW
Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines
- Can you hear me now? NASA to test laser communication system