1

Apple Store Turns 15, Gets Retail Revamp

This week marked the 15th anniversary of the first Apple Store opening. We take a look at the history of…

Google I/O 2016: 5 Hot Takeaways

At this week’s Google I/O annual developer conference the company revealed dramatic products that will push the boundaries of technology…

SAP Cloud Partnership, Feature Phone Sale: Microsoft Roundup

This week brought news of a Windows 10 Mobile Insider preview build, a Bing Concierge Bot, plans to bring SAP…

Google's modular smartphone project sacrificed its original vision

Google’s Project Ara modular smartphone is coming to developers soon, but it’s lost a key part of its customization vision…

The Best of the Physics arXiv (week ending May 21, 2016)

This week’s most interesting and intriguing papers from the Physics arXiv.

Wireless Defense Strategies in the IoT Era

Reevaluate access layer protection in enterprise WLANs and why deploying ad-hoc security is no longer enough to protect against threats….

Making the Case for SMB Security Services

In this exclusive e-guide, Associate Editor Spencer Smith looks into the 3 main types of cyberthreats SMBs need to watch…

Building a Security Fabric for Today's Networks

Build an enterprise security system that focuses on deploying defensive strategies through the entire enterprise, not just around the perimeter….

Moving Past the Password? Not So Fast

The password might not be dead but that doesn’t mean it’s working. This guide looks at how other user authentication…

Protect Patient Data with Strong Desktop Security

Learn how to build a security wall around PHI by addressing desktop security vulnerabilities. Unveil 7 ways to strengthen desktop…

1 2 1,791