Why exactly are we blaming employees for doing what they need to do to get work done?
It's an amazing new system that utilizes multiple antennas to steer transmissions between broadband modems, TVs, PCs and smartphones. Haven't we done this story before? Nah, let's lead with it anyway.
At the rate current backhaul networks are currently evolving, the bandwidth required by devices roaming between small cells and macro cells could overwhelm their control systems.
Choosing a mobile application development platform is an "either/or" deal, for various architectural reasons, and FeedHenry had been an attractive "or" against Red Hat's "either."
If Windows Phone's market share never exceeds 10% again, it might not make much difference. Microsoft is building out its revenue platform for mobile services anyway, whether or not Windows plays a role.
A new cloud-based rapid apps development platform may make enterprises reconsider their stance on whether HTML5 and native code are the only two ways to go.
Read that headline again, because it's meant to be good news. Governance strategies advise businesses to focus on protecting information and helping people.
Last Monday in Spotlight, I pointed you toward an article from the personal blog of security researcher Jonathan Zdziarski, who reported on the existence of several exploitable back doors around security features in Apple's iOS.
Among the many things Apple is notorious about not telling people is the architecture of its iOS system services. While on the surface you'd think Apple is operating in the best interests of security, what this means is that an active open source movement has germinated with the explicit goal of ferreting out ways to establish rootkits and other exploitative, stealth services on iPhones and iPads.
The system Ping Identity has been building (and to some extent, acquiring) to let people log onto services with their mobile phones is now ready for public launch.