WatchGuard Technologies, which provides business security solutions, today announced the availability of two new wireless access point products, providing customers with the same level of security for their wireless local access network ...
U.S. corporations tend to be far less concerned with the brand of mobile devices in the workplace and more worried about which employees have access to company data, according to a Dell survey of 1,500 senior IT managers in 10 countries. ...
Tags: mobile devices, company data, mobile
Computerworld-Late next year,consumers will be able to buy smartphones that either come with native hypervisor software or use an app allowing them to run two interfaces on the phone:one for personal use,one for work. The technology could ...
Tags: Dual-identity smartphones, app, the bring-your-own-device(BYOD)
FEDERAL WAY, WA, August 25, 2012 /24-7PressRelease/ -- Digital Learning Now! (DLN) today released "Funding the Shift to Digital Learning: Three Strategies for Funding Sustainable High-Access Environments," the first in the DLN Smart Series ...
Tags: DLN Smart Series, interactive papers, smartphones, tablets, laptops
IT managers in businesses and governments are taking steps to ensure that the Summer Olympics do not bust networks or budgets. The opportunity for problems is there. The Olympics will be live streamed, and London's time difference means ...
Tags: IT, managers, businesses, overnments, Summer Olympics, networks, budgets
Enterprise IT decision makers are about half as enthusiastic about the new Windows 8 as they were three years ago about the then-just-released Windows 7, an analyst said. Employees, however, have a higher-than-expected interest in the ...
Tags: CEO Steve Ballmer, consumerisation, Microsoft, Windows 7
Late next year, consumers will be able to buy smartphones that either come with native hypervisor software or use an app allowing them to run two interfaces on the phone: one for personal use, one for work. The technology could help ...
Tags: AMD, Business devices, BYOD, consumer, Dual hypervisor, enterprise
During the next eight years, the amount of digital data produced will exceed 40 zettabytes, which is the equivalent of 5,200 GB of data for every man, woman and child on Earth, according to an updated Digital Universe study released today. ...
Tags: data, digital, digital universe, gb, highlightedpost, study
Dell announces Quest Software acquisition… finally Dell has entered into a definitive agreement to buy desktop virtualisation-related vendor Quest Software for $2.36bn (pound 1.51bn). Under terms of the agreement, Dell Inc. will ...
Tags: Dell, Quest Software, acquisition
The latest smartphone market share figures from Gartner show that Android-based devices, and in particular handsets from Samsung, are growing in popularity globally. Gartner’s second quarter 2012 market share data showed that ...
Tags: smartphone market, Gartner, Samsung, Apple, Nokia
Computerworld-During the next eight years,the amount of digital data produced will exceed 40 zettabytes,which is the equivalent of 5,200 GB of data for every man,woman and child on Earth,according to an updated Digital Universe study ...
Tags: 5, 200 GB of data, 40 zettabytes, Digital universe explained, social media
The majority(87%)of public sector organisations have no formal bring-your-own-device(BYOD)strategy,according to Freedom of Information research. Of the 41 local and central councils that responded to questions submitted by data backup ...
Tags: public sector organisations, BYOD policies, smartphones, tablets
Mac people refuse to use anything without an Apple logo on it. PC people insist that they could never feel comfortable using a computer they couldn't open up themselves, if necessary. And everyone agrees that the mobile devices they prefer ...
Tags: Office
Nearly half of enterprises that allow employee-owned devices to connect to a company's network have experienced a data breach, a study has revealed. Most of these companies reacted by restricting data access rights (45%) or installing ...
Tags: employee-owned devices, company's network, data breach, security software