consumerization of IT - News, Features, and Slideshows

News

  • Startup aims SDN technology at Cisco WANs

    SDNs aren't just for data center networks, despite the best-use-case-scenario arguments for network virtualization and flow management pervading the industry.

    Written by Jim Duffy12 April 13 12:23
  • BYOD Gets Messy with AT&T Class Action Lawsuit

    With a BYOD twist, AT&T agreed to settle a class action lawsuit for overcharging corporate customers for almost seven years. But like most things involving BYOD, this gets complicated.

    Written by Tom Kaneshige10 April 13 20:07
  • Do's and don'ts for using Android in business

    While it's important to remember that the use of Google Android software in the enterprise is still a comparatively young phenomenon, there are a few general guidelines that businesses looking to use the platform would do well to remember.

    Written by Jon Gold02 April 13 11:16
  • Verify the security of your mobile apps

    The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018. The app development boom has fostered a competitive environment for developers and there is a focus on speed. But In the rush to deploy enterprise apps and start reaping the benefits, it is easy to overlook key security risks that could cause irreparable damage to your business.

    Written by Michelle Drolet, Towerwall15 March 13 04:04
  • Productivity gains spur Intel to expand BYOD program

    Intel has expanded its bring-your-own-device (BYOD) program, which has been a resounding success, providing around 5 million hours of annual productivity gains last year, the company said.

    Written by Agam Shah05 March 13 16:50
  • Securing the network beyond passwords

    Passwords have been a weakness of network security since the development of computer networks. Through guessing weak passwords, exploiting weak passwords, acquiring passwords through social engineering, or more recently using malicious software like Advanced Persistent Threats (APT), attackers have focused on compromising passwords to gain access to the network.

    Written by Mike Mahurin, CISSP, CISM, CISA, a Design Architect with Alexander Open Systems04 March 13 07:18
  • Federal CIOs Still Say No to BYOD

    Government IT leaders who oversee sensitive or classified information require firm device-management policies to address security concerns before they will even consider allowing workers' personal smartphones and tablets behind the firewall.

    Written by Kenneth Corbin01 March 13 14:21
  • Is your enterprise iPhone app user-friendly?

    Mobile enterprise apps running on iPhones, Androids and other smartphones must be "user-friendly." But what does that really mean? A mobile app expert gives a concrete definition.

    Written by Tom Kaneshige25 Feb. 13 19:38
  • BYOD gets attention at Mobile World Congress

    Helping IT shops deal with the security and management of consumer smartphones and tablets in the workplace will be a big theme at Mobile World Congress this week.

    Written by Matt Hamblen25 Feb. 13 07:50
[]