Features

mobile health
google eagle

customer service

Why happy developers equal happy customers

A company's greatest competitive advantage is its ability to deliver a great customer experience. And that starts with a happy software development team.

1 byod

7 ways MDM threatens employee privacy

To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete...

The far-out office of the future is (almost) here

Behold the awesome office of the future

From shape-shifting furniture to holographic displays, the workplace of the future promises more than just another day at the office

web apps primary

12 powerful websites that can replace your PC's desktop software

These days, even brawny tasks like video editing can take place solely in your browser. Check out these great sites for productivity, creativity, security and more.

wallet man money

To pay or not to pay: Too many victims say yes to ransomware

Ransomware’s success rate is so alarming that it is the subject of an all-day “summit” at this week’s RSA conference. Ironically, experts say defending against it is not terribly difficult, and how to do it is widely publicized – it’s...

machine learning misunderstandings 1

What is the point of learning C?

The C programming language is hard to learn, its popularity is waning and demand is shifting. Is there any point in learning C?

phone gimmicks main

The 12 worst Android phone gimmicks once hailed as 'innovations'

These were heralded as impressive new gotta-have-it features. In hindsight, they're pretty useless.

01 worms

Heartbreaking hacks

Every year hackers take advantage of cupid’s sharp arrow to trip-up unsuspecting online users.

glowing box

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

A stack of coins

Java 9's other new enhancements, Part 2: Milling Project Coin

JEP 213 builds on Java 7's Project Coin with small language improvements and additions for your Java programs

Best Android Phone hub primary image

Best Android phones: What should you buy?

Picking an Android phone can be difficult, but we're here to help. These are the top Android phones you should consider bringing home.

ai and marketing

10 things marketers need to know about AI

AI-enabled marketing isn't just about cute chatbots. Here's what CMOs, CIOs and others need to know to make the most of AI in their marketing initiatives in 2017 and beyond.

01 network

How to lock down your security system

The most important, but least recognized, steps organizations must take to make their security systems more cyber secure.

file sharing apps primary

4 apps to share iOS, Android and Windows files

If you work across multiple platforms and operating systems, these four apps let you seamlessly share photos, videos and files across your devices.

security cameras pole

Are companies doing enough on the IoT security front?

If security executives thought they had a lot to handle with the growth of mobile devices and the expanding digital enterprise, the emergence of connected products, corporate assets, vehicles and other “things” is taking security...

new years resolutions apps primary

10 apps you need to get your New Year's resolutions back on track

Your New Year's resolutions are no longer shiny and new—you need apps to help you fight through resolution fatigue!

dlink camera

Can the FTC save the IoT?

Enormous amounts of effort, time and money haven’t made much of a dent in the insecurity of the Internet of Things. So, what about making more use of the old-fashioned lawsuit? The Federal Trade Commission is having some impact with...

01 challenges

What cyberinsurance gotchas companies must be ready for

CipherLoc Vice President Mike Salas details six challenges companies will face as the insurance industry begins to expand its presence in the cybersecurity industry.

Load More