Telecommuting is good for employees and employers
As technology evolves, many of the barriers that have traditionally limited telecommuting continue to disappear.
As technology evolves, many of the barriers that have traditionally limited telecommuting continue to disappear.
Home is where the network is: That's the mantra of networking vendors at the Consumer Electronics Show 2011 in Las Vegas this week.
Anyone who's attended tech conventions over the past five years has heard plenty about 4G wireless networks, but this year the hype has become a reality.
It's always a challenge for IT departments to anticipate how corporate technical demands will evolve, especially when IT budgets have been as tight as a drum for two years.
Retailers use various marketing and technical terms to describe the smartphones they sell. Some of those terms represent meaningful phone characteristics, while others are mostly hype. To help smartphone shoppers understand what they're looking at, we offer definitions of the most commonly used specifications, and explain why they are important.
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on sexual assault-related charges. The fact that WikiLeaks remains stubbornly and defiantly online holds some lessons for other sites when it comes to resilience and survivability.
A number of different technologies are being developed or improved to offer higher speeds for fixed and mobile broadband networks, as operators are preparing to compete with each other and carry video traffic in 3D and at higher resolutions, which is expected to happen in the coming year.
Intel has been on a buying binge lately. Just two weeks ago the world's largest chip maker agreed to acquire security vendor McAfee for $7.68 billion, and today it announced plans to buy Infineon Technologies' Wireless Solutions (WLS) division for $1.4 billion.
So this guy at AirTight Networks says Wi-Fi Protected Access 2 has a "hard shell on the outside, but a soft underbelly inside"due to an overlooked vulnerability, and an attacker can decrypt traffic that's been encrypted with WPA2. Is this total panic time?
The more I use the HTC Incredible, the more I like it. And the thing that really makes the Incredible, er, incredible is its operating system, Android<.
The world is almost out of IP addresses--or at least it's almost out of the IPv4 addresses that IT admins and users are most familiar with. Fortunately, IPv6 has been developed to exponentially expand the pool of available IP addresses while also providing a few other benefits.
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Terry Childs' guilty conviction struck a nerve with IT staffers this week.
On March 5, I stepped off a plane at Port-au-Prince airport and was confronted by two things: oppressive heat and chaos. Down the stairs and onto the tarmac we went. It looked like a war zone. But it was actually the aftermath of the tremendous earthquake in Haiti.
The world's longest cruise ship posed knotty wireless networking problems but also provided Royal Caribbean the opportunity to pounce on iPhones, touchscreens and MPLS networking in order to deliver luxury services.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
By Kalyan Madala, CTO, IBM ASEANZK