HomeSmall Business

Small Business

Getac RX10 Rugged Tablet Designed for Field Service

Rugged computing specialist Getac announced a portable, lightweight and feature-loaded rugged tablet, the RX10, designed for field service.The tablet, which includes an ergonomic handle,...

Fantom DataShield Portable Drives Boast AES Encryption

Data storage specialist Fantom Drives announced the launch of the DataShield portable data drive, which provides the option of traditional hard disk drives (HDDs)...

Internet of Things Tech Seen as a Boost for Businesses

The Internet of things (IoT) is not just a trend being embraced by businesses, but also a crucial way to get things done, according...

Teleworking Rates Increase as Technology Evolves

A surprising nine out of 10 full-time U.S. employees believe their boss trusts them to get their job done regardless of where and when...

Quantum Debuts Xcellis Workflow Storage System

Quantum announced the launch of Xcellis workflow storage, the company’s next-generation storage system engineered to optimize demanding workflows.Powered by Quantum’s StorNext scale-out storage platform,...

Getac RX10H Rugged Tablet Aimed at Health Care Organizations

Getac announced the release of the RX10H, a rugged tablet designed for use in a variety of health care environments.The device provides a sanitized...

Data Center Inefficiencies Cost Businesses Time, Money

Inefficiencies are costing data centers time and money, while 43 percent of data centers rely on manual methods for capacity planning and forecasting, according...

Home Automation Market to Top $100 Billion by 2020

Consumer spending on smart home services, including entertainment, health, energy and home automation will reach $100 billion by 2020, well over twice the estimated...

Centrify Adds Support for Android at Work

Enterprise Identity-as-a-Service (IDaaS) provider Centrify announced plans to work with Google to deliver integrated identity and mobile management for Android for Work.In addition to...

Businesses Lack Security Controls for Accessing Applications

Despite widespread and highly publicized security breaches, most companies still fail to require necessary security controls for accessing enterprise applications, including those applications behind...