Qualcomm's latest efforts highlight how the company is supporting multiple clouds, development platforms, and standards. The goal: Be a Swiss Army chip for Internet of Things deployments.
That may sound like small change, but $350 million overall for two of the largest data breaches on record remains the steepest financial ding in history.
Trump wants to bring factories back to the US, but automation and AI are changing the meaning of work.
It's an open-source love fest: The Kubernetes container cluster manager is now generally available on Microsoft's Azure Container Service.
Want to give a legacy application more life? A startup pitches micro apps. But whatever the technology it's clear there's a multi-year move to squeeze more efficiency out of legacy systems as enterprises plot the future.
This policy outlines the appropriate procedures for conducting commercial endorsements to ensure that legal and ethical guidelines are properly followed and that the company and its staff are safeguarded....
At $651, the average price of an iPhone is already well above the $208 average cost of an Android smartphone. If Apple adds technology that costs a lot more money to produce, are you ready to foot the bill?
Overall iPhone production for the year also estimated to increase by 6 percent compared to last year.
While Linux might be on millions of IoT devices, Kaspersky says there's no trace of it on its new secure OS.
Cybercriminals are increasingly targeting mobile devices with malicious software, as more and more people use them to store their most personal data.
Samsung doubles down on virtual reality for the upcoming Mobile World Congress as it unveils new products from its C-Lab.
Also, some tweaks are rumored to be incoming for the iPhone SE and iPhone 7.
Voice-controlled assistant can search channels and use Alexa skills.
Too many small and medium-sized businesses think they're not going to be targeted by ransomware. They're wrong.
Despite Microsoft's efforts to clarify and boost Windows 10 privacy controls, data-protection watchdogs still aren't satisfied.
Researchers think they've found a way of using the vast untapped resources of processing power in smartphones and IoT devices for large-scale number-crunching.
The unpatched vulnerabilities can be exploited for attacks which should be of particular interest to the enterprise.
Security experts reveal their thoughts on the true threats to healthcare providers and patients now and in the future.