Analysts have predicted that the Internet of Things will continue to grow in 2014, and more enterprises will start to realise the potential benefits.
Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but IT still has to maintain some degree of control over the applications used and where sensitive data is stored. Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through "shadow IT."
Depending on the risk appetite of organizations in general and their CIOs in particular, end of Microsoft’s support for XP could end up being a big deal.
Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony."
3rd Platform is the industry's emerging platform for growth and innovation built on the technology pillars of mobile computing, cloud services, big data and analytics, and social networking.
42 percent of organisations rely on outside resources to augment their IT audit departments due to lack of right internal resources, according to a newly released survey from global consulting firm Protiviti.
Apple is seeking to bar Samsung Electronics executives with knowledge of leaked confidential information from negotiating any mobile device licenses for the South Korean company for the next two years.
Risk taking and creativity are far less important to running a successful company than good old fashioned hard work.
China says it wants Microsoft to extend support for Windows XP because that will help it in its fight to stop proliferation of pirated Microsoft software.
Based on comments from experts at this week's AppNation event, to say mobile apps are a disruptive technology is an understatement.