People who feel good while doing their job tend to work better, contribute more and[...]
[...]
Few doubt the increasing popularity of mobile devices, specifically smartphones and tablets. Their numbers grow[...]
Malicious Distributed Denial of Service (DDoS) attacks do not occur often. Nevertheless, for an enterprise[...]
As a teenager just entering the world of business I had to go through a[...]
By now we’ve all heard the term Bring Your Own Device (BYOD). This phenomenon is[...]
Mobile Device Management (MDM) is only one part of the broader Enterprise Mobility Management (EMM)[...]
What is an APT? APT stands for Advanced Persistent Threat. The goal of this form[...]
Recently I attended the IBM Security Systems Analyst Meet the Experts day in Heathrow. With[...]
Computer security is a hot topic today, and much talked about. There are endless emanations[...]
By Charles Brett Until relatively recently most in IT looked upon Graphics Processing Units (GPUs[1])[...]
By Charles Brett Talking to end users and some vendors, especially from the mobile space,[...]
By Charles Brett 2014’s Mobile World Congress in Barcelona brought together the mobile telephony infrastructure[...]
By Charles Brett Security covers many dimensions, including the physical and logical. As such many[...]
By Charles Brett Are enterprises asking the right questions about data and its storage? This[...]
By Charles Brett Vodafone is an exception as a telco. It has a heritage in[...]