Meltdown and Spectre exploits: Cutting through the FUD
A breakdown of what the Meltdown and Spectre exploits are, what they aren’t, the risks they pose, and what you should do.
A breakdown of what the Meltdown and Spectre exploits are, what they aren’t, the risks they pose, and what you should do.
Tablets haven't killed off the PC market, which is about to return from a downturn.
The enhancements in the Surface Pro 3 are aimed straight at the enterprise.
Consumers will lead the charge to the Internet of Things, but enterprise adaptation will not be far behind. Will your IT department be ready?
Getting Windows Phone 8 Update 3, and eventually Windows Phone 8.1, on phablets is one thing, but getting a foothold in the low-end tablet market is a bigger opportunity.
Is anything secure anymore? The National Security Agency (NSA) leaks have produced a number of side effects. What we assumed was a safe form of communications is perhaps not so secure after all. The gold standard of secure mobile messaging, BlackBerry, may have been compromised.
As more is demanded of smartphones and tablets, the limits of ARM's RISC architecture will become apparent.
Expect enterprises to start instituting stricter policies to make BYOD a more secure and cost-effective policy.