Search Results:
1-15 of 9591 results

Could a Nexus 6 be sold for less than $100?

Google is reportedly working on budget Nexus device.

Mobile & tablets

Published 20 April 2014

How can CIOs slash application management costs by 50%?

Application development and maintenance currently accounts for 34% of IT budgets.

Service Management

Published 17 April 2014

Future cyborg glasses to mimic eye gestures

The new device displays computer-generated eye animations rather than the wearer's real ones.

Mobile & tablets

Published 17 April 2014

5 tips to avoid online scams this Easter

A new wave of dangerous spam has the UK this holiday season. Here’s how to defend yourself against it.

Security

Published 17 April 2014

Top 5 budget tablets for 2014

Want a tablet on the cheap? Here are the latest and best budget tablets on the market.

Mobile & tablets

Published 17 April 2014

Dangerous spam targets Brits with fake Easter offers

People are being conned out of money and their personal data with the temptation of God and Viagra.

Malware

Published 17 April 2014

One quarter of SMBs 'don’t have a mobile strategy'

But they rate mobility as important as electricity for their business.

Mobile & tablets

Published 16 April 2014

Microsoft: Stop moaning about big data

Microsoft wants to shake up the way you see and use big data.

Business Intelligence

Published 16 April 2014

Motorola UK head steps down following Lenovo acquisition

Morley came to know about Motorola being acquired by Lenovo about 30 minutes prior to the deal.

Mobile & tablets

Published 16 April 2014

Smartphones to come preloaded with anti-theft tech from next year

Smartphone makers, carriers pledge to implement anti-theft measures.

Security

Published 16 April 2014

Dell SecureWorks launches new managed service for enterprises

AETD service is part of the Dell SecureWorks' suite of Internet security services.

Security

Published 16 April 2014

Google to integrate micro camera into smart contact lens

The new smart lens could be controlled via a system of unique blinking patterns.

Mobile & tablets

Published 16 April 2014

Samsung Galaxy S5's fingerprint sensor ‘hacked’

White hat hackers used earlier method to parody the Touch ID scanner on the Apple’s iPhone 5S to hack Samsung’s authentication technology.

Mobile & tablets

Published 16 April 2014

Stop using passwords that are hard to remember but easy for computers to guess

A long string of memorable words is much more secure than a short set of random characters.

Malware

Published 16 April 2014

Microcamera shows Google Glass will turn into Google contact lens

Camera patents hint at the future of wearable technology.

Mobile & tablets

Published 16 April 2014

1-15 of 9591 results

Join our network

717 people like this.
1536 people follow this.

CBR Supplier Recommendations

  • DataFlux - Data Management Technology

    DataFlux enables business agility and IT efficiency by providing innovative data management technology and services that transform data into a strategic asset, helping you reduce costs, optimise revenue and mitigate risks....

  • Qualys - IT security risk and compliance solutions

    Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organisations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly secure and within regulatory compliance....

  • dynaTrace

    The way applications are built today has fundamentally changed. A new generation of application performance management (APM) is required. dynaTrace is the innovator and emerging leader in APM....

  • BCS - Enabling the Information Society

    Established in 1957, BCS, The Chartered Institute for IT, promotes wider social and economic progress through the advancement of information technology science and practice....

See more

CBR White Paper Recommendations

  • Practical Fundamentals for Master Data Management

    13 April 2011 | By DataFlux

    In this paper we look at the levels of maturity and capability necessary for deploying enterprisewide initiatives, such as MDM, and ponder why these initiatives fail. ...

    White Papers
  • Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

    22 February 2011 | By Qualys

    The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security....

    White Papers
  • Web Application Security for Dummies®

    22 February 2011 | By Qualys

    Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures....

    White Papers
  • Continuous Application Performance for Enterprise .NET Systems

    03 November 2010 | By dynaTrace

    IT needs a way to strategically implement application performance management across the entire software lifecycle, while providing each stakeholder in development, test, production and the business with the information they need for efficient collaboration to proactively prevent performance issues and quickly resolve those issues that occur later. This is the premise of dynaTrace's system for Continuous Application Performance Management....

    White Papers
  • Continuous Application Performance Management

    03 November 2010 | By dynaTrace

    This white paper discusses the new requirements for application performance management (APM) in the face of accelerating complexity in application development, architectural design, and production environments. There is no question that applications continue to become more business critical. They are weapons upon which we rely to compete in our given marketplace. They are more externally focused than ever before, touching customers, business partners and supply chain and driving more and more of our business. These business critical applications must not just be “available” 24/7, they must perform optimally at all times for all users. They must scale further than ever before, supporting more and more users driving more and more transactions. And we are tweaking them, changing them, enhancing them more and more often than ever before. All this is going on while we fold in more 3rd party code including open source, distribute our applications globally and shift from physical to virtual production environments....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.