This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. The latest challenge confronting IT organizations is managing the ...
Tags: wireless LAN, Network World, IT organizations, mobile device
Samsung said Wednesday it is working on an update for a software flaw that could allow attackers to siphon personal data from a phone. The vulnerability affects Samsung’s S2 and S3 phones and several models of its Galaxy line, ...
Despite widespread calls for more spectrum to carry mobile data, there is a wide range of technologies already being used or explored that could help to speed up networks or put off the day when more frequencies need to be cleared. ...
Tags: spectrum, mobile data, technologies, could, networks
This month's price increase for Microsoft client-access licenses (CAL) is a "lose-lose" deal for enterprise customers, but will likely yield a major revenue boost for Microsoft, analysts say. On Dec. 1, Microsoft overhauled its enterprise ...
Tags: Microsoft, client-access licenses, CALs, revenue
Global Leader in mobile cloud solutions shares ten must-have policies for mobile peace of mind. Fiberlink, a global leader in application management and software-as-a-service (SaaS) solutions for secure mobile device management delivered ...
Tags: Fiberlink, mobile cloud solutions, SaaS, Protect Mobility
You will find the Counter Terrorist magazine at conferences and exercises such as the Homeland Security Professionals Conference, NTOA annual, Urban Shield, Counter Terror Expo, GovSec in addition to numerous military trade shows through ...
Tags: Homeland Security Professionals Conference, Counter Terrorist Magazine
NiceMeeting is currently the only one of its kind solution on the market that is capable to turn every attendee's mobile device into a personal conference display allowing event planners to transform ordinary events into dynamic, ...
Tags: NiceMeeting, mobile device, personal conference display
Samsung shared more details about its next-generation Exynos 5 Dual dual-core mobile processor, saying it will be twice as fast as comparable Exynos chips used in the company's smartphones and tablets. The chip will also consume 30% less ...
Tags: Samsung, Exynos, mobile processor, smartphones, tablets
Avant Garde Information Solutions (AGIS), a leader in business software development for small and medium-sized businesses (SMBs), celebrates its 10th anniversary in 2012, claiming its place as the premier SMB software provider offering one ...
Tags: Avant Garde Inf, ormation Solutions, business software, SMB, software
Dell has made a deal to acquire data-protection vendor Credant Technologies and plans to add the company's technology to its enterprise IT security offerings. The companies did not disclose the terms of the deal.Credant,founded in 2001,is ...
Mark Large, GOSH IT director, said: "Our clinicians told us that they want to use Apple technology, so it is something we are embracing, and have created one of the best infrastructures in the world to make it happen." "What is ...
Tags: Mark Large, IT industry, Apple technology, information management
LetMobile , a leading provider of Secure Corporate Collaboration Solutions for Personal Mobile Devices, today announced a new version of its Secure Mobile E-mail Gateway product. LetMobile is the first to offer a gateway-based DLP and ...
Tags: LetMobile, Personal Mobile Devices, Secure Mobile Emai, mobile device
Nvidia on Thursday said it will bring wireless display to its Tegra chips, which will allow tablets and smartphones based on the chips to beam images and audio directly to high-definition TVs. The technology being implemented in Tegra ...
Tags: Nvidia, wireless display, Tegra chips, ablets, smartphones
WinMagic Inc., the innovator in data security and encryption solutions, recently announced a strategic agreement with Interwork Technologies Inc. to distribute WinMagic's SecureDoc Data Encryption and Security software in North America. ...
Tags: WinMagic, data security, encryption solution, Interwork Technologies
Kaspersky Lab has outlined key security trends of 2012 and presented their views on the core threats of 2013. The most notable predictions for the next year include the continued rise of targeted attacks, cyber-espionage and nation-state ...
Tags: malware, Kaspersky, cyber espionage, cyber