It started with a sobering declaration and ended with what for some was an inebriating party....
This week's IBM Edge2014 infrastructure event hinted at how the company plans to use experience to its advantage. Far from burning out or fading away like an aging rock star, IBM intends to join today's young rockers on stage -- and steal the show....
A new iOSphere trend may have been launched this week, with a video selfie that, by some magical logic, further confirms the expectation that iPhone 6 will have a 4.7-inch display....
William Hanna, vice president of technical services at the University of Pittsburgh Medical Center (UPMC), went out looking for a way to add capacity to a backup network and found what he wanted in Software Defined Networking (SDN) tools from Alcatel-Lucent. Network World Editor in Chief John Dix sat down with Hanna to learn about the process and experience....
Attacks that proved successful on PCs are now being tested on unwitting mobile device users to see what works -- and with the number of mobile devices with poor protection soaring, there are plenty of easy targets. "Attackers are definitely searching after the weakest point in the chain," and then honing in on the most successful scams, says Lior Kohavi, CTO at CYREN, a cloud-based security solutions provider in McLean, Va....
Webroot today released the results of a survey on BYOD that suggests the employee-employer trust gap is widening. The company also created an eight-point "BYOD Bill of Rights" to help bridge that gap while keeping corporate data secure....
Google Apps got a mobility upgrade on Wednesday, as the company added four new features to its MDM toolkit for Android smartphones....
Chalk up another victory for corporate surveillance: Five years after advocates came up with an easy way to let you browse the Web with just a little privacy, the Do Not Track system is in tatters and that pair of boots you looked at online last month is still stalking you from website to website....
An older version of Microsoft's Internet Explorer browser has an unpatched software flaw that could allow rogue code to run on a computer, the second such flaw found in a month....