Features

1amazon title
121714 wacky tech intro

A coach on your wrist: Wearable fitness gadgets for everyone

10 fitness trackers and GPS watches you can buy right now

Whether you're training for a race, getting in shape or are just curious about your daily activity, these fitness bands and GPS watches can give you the info and encouragement you need.

strategy

Why Microsoft’s mobile marketing strategy hinges on iOS and Android

With apps like Sway and the touch version of Office, Microsoft hopes to spark both user and enterprise interest in Windows phones and tablets.

point of sale terminal

Top malware families turn point-of-sale into point-of-theft

'Tis the season to be jolly, but it won't be a time to celebrate if consumers and organizations alike are not hyper-vigilant about the security of their purchases. While the American credit card system will become more secure in the...

121714 google onionpintro b

The Onion’s 10 greatest gags about Google

“America’s Finest News Source,” better known as The Onion, has been poking fun at Google for more than a decade. Here are 10 of what we believe are its better efforts.

121614 hanukkah 1

8 Android and iOS apps for Hanukkah

Don’t let your relatives catch you on your phone though, or you’ll get such a zetz…

121614 12 days techmas primary

The 12 gifts of Techmas

12 gifts that any geek worth his salted hash would not just love but cherish.

A man stands alone inside spiralling cloud abstraction, on dark twisted tunnel background.

How to work out the kinks in the cloud

Large organizations are feeling the pressure to push ahead with software-defined data centers, even if they must build them using immature technologies.

deadly devices primary

7 devices that make your data vulnerable

There’s a new threat landscape to consider: the Internet of Things (IoT). And the endpoints in this landscape are vulnerable to attack.

low tech threats

3 low-tech threats that lead to high-profile breaches

More often than not, data breaches are initiated by low tech means. Here are three common low-tech attack vectors, and suggestions for how security teams can address them.

00 job loss

9 data breaches that cost someone their job

Notable breach-related job losses in 2014.

0 artaic title

Mosaic design gets assist from robotics and enterprise software

Mosaic design is an ancient art form, but Artaic, a Boston-based startup, is automating the manufacturing process by integrating robotics, CAD and ERP.

holiday party

Holiday survival guide: Dos and don'ts for your office party

Techies: Office hoilday parties are your opportunity to have a good time with your co-workers! Yes, they're slightly scary. Yes, you can do it wrong. But these guidelines will help you bring the cheer.

The best office apps for Android

The best office apps for Android

Which office package provides the best productivity experience on Android? We put the leading contenders to the test.

Goofy faces

The 10 greatest and goofiest gadgets of 2014

We look back at the tech products that were released for sale to the general public in 2014, and picked out the ones that left an impression.

android apple lock

How to secure Apple and Android mobile devices using 802.1X

Understanding all the 802.1X client settings can certainly help during deployment and support of an enterprise network.

2015 security predictions

11 predictions for security in 2015

It’s tough to know what the security landscape will look like in six months, never mind a year. But that doesn’t mean it’s not worth trying.

death of antivirus

Death of antivirus software greatly exaggerated

After years of predicted demise, AV software continues to protect.

Illustration: searching binary data traffic.

Finding critical business data -- fast

These CIOs are jumping on a fast-moving trend — mining small data sets to deliver valuable insights quickly to the right people at the right time.

Load More