- Major security flaws threaten satellite communications
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Chrome OS may kill the password with Easy Unlock smartphone option
- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- Michaels says breach at its stores affected nearly 3M payment cards
- Galaxy S5 deep-dive review: Long on hype, short on delivery
- NBN Co hits 105Mbps in limited FTTN trial
- Telcos seek to strengthen NBN Co wholesale restrictions
- UPDATED: 4G in Australia: The state of the nation
- TPG should pay rural levy for each FTTB service: NBN Co
Bring Your Own Device (BYOD) in pictures
Aruba Networks announced a package of software upgrades designed to better accommodate all-wireless workplaces, including sites where it's common to see employees using three different mobile devices with multiple applications.
The Australian National Audit Office (ANAO) has upgraded its mobile fleet to BlackBerry 10 while allowing other devices under a Bring Your Own Device (BYOD) scheme managed by BES10, the BlackBerry mobile device management (MDM) software.
Enterprises this year will begin to experiment with wearable computing as a way to increase safety and productivity in the workplace, according to Deloitte.
The bring-your-own-device trend will only get more nerve-wracking for IT managers in 2014 because of the 30% annual growth expected for smartphones purchased under a BYOD approach, and the further emergence of Windows Phone as a third platform behind Android and iOS.
The enterprise’s need for control must be balanced against what users want when deciding on which smartphones to support in a choose-your-own-device (CYOD) scheme, say analysts.
For generations, office ergonomics involved various measures intended to keep employees productive while they remained in their chairs. New thinking and new devices are changing all that.
Among several BYOD strategies Starz has tried over the past five years, dual persona smartphones -- offering employees a business and personal interface -- took off like a lead balloon.
Like the tablet market, Google Glass may currently be viewed as a consumer product but it will soon be seen on the faces of IT and mobile employees.
Customers are pushing the limits of the software -- asking it to manage and do many more things than it was originally created to do -- and vendors are happy to oblige.
Sure you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes. Insider (registration required)
This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- In pictures: Customer 360 Symposium hits the Hunter Valley
- Why CMOs must embrace the seven principles of agile marketing
- Google opens the floodgates for new 'social' ads
- Telefónica starts exchange for targeted mobile ads
- Crowdsource guide ranks marketing automation platforms by user recommendations and company size