Traditionally, the area of information security has been purely defensive. Classic examples of the defensive mechanisms used to protect communication networks include firewalls, encryption...
/images/stories/knowledge_center/analysts_corner.gif
I am grateful to have been invited by the GSM Association to lead a session on the future of mobile location-based services, or...
/images/stories/knowledge_center/analysts_corner.gifThe CTIA recently asked me to moderate a very interesting panel session on Camera Phone 2D (two-dimensional) Bar Code Scanning. The session was held...
/images/stories/70x50/bug_knowledgecenter_70x70_(2).jpgGenerally, we think of security in either of two ways: as an operational IT issue focused on defending our computers and networks from attackers...
Yep. Looks like Gartner, that internationally respected IT analyzer famous for its Magic Quandrants, has reported more proof of something The Station has been...
Advanced Micro Devices has agreed to sell its underperforming Digital Television (DTV) business to Broadcom for $192.8 million, the two companies announced Aug. 25.The...
TimeTrade Systems, which makes software that helps harried professionals schedule appointments, released a personal SAAS scheduling application for sales and service workers Aug. 25.TimeDriver,...
IBM researchers are claiming a significant breakthrough in the emerging field of nanotechnology that could change the way engineers and the IT industry think...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...