Check out the hottest mobile IT stories for Wednesday, June 11 including wireless Internet traffic surpassing wired by 2018, IT leaders ignorance of the impact of the data dump from mobile apps on infrastructure, almost 3M wearable band shipments in the first quarter, the rise of IoT developers and how MapQuest and MLB are shaking up the mobile content landscape.
Check out the hottest mobile IT stories for May 6, including the expected release features of the iWatch, the coming growth in the small cell market, how Nokia overtook Cisco in a key market, the top 20 mobile security players and how the African continent is about to get a lot more mobile.
With the aid of an animation that literally depicted the Cisco logo mowing over competitors, the CEO opened his annual conference with the most optimistic sounding threat imaginable.
Following a photo and post by Sean Gallagher in ArsTechnica reportedly showing the NSA secretly installing spyware in Cisco routers, the company's CEO, John Chambers, wrote a letter to President Obama pleading for an end to NSA hacking. But even if the NSA refrains from such, will the damage done to private corporations' reputations persist?
Executives might not want another screen cluttering their desks. So Cisco is working to give them a reason to kick one of those screens off.
Can a company that's accustomed to setting the tone for an entire industry become content with simply finding some degree of harmony?
In an empassioned statement, Cisco's general counsel calls for governments to step out of the network and network components design businesses.
A service called InterCloud aims to create a layer of abstraction giving hybrid cloud customers more freedom to use the equipment they choose.
The company's short, though earnest, effort to build a single collaboration platform under its own brand comes to an end that shows evidence of bitterness.
The fact that old applications that can't (easily) be rewritten rely on an older version of the Java runtime, may be a factor in nine out of ten client-side exploits.