In a strange move, new Yahoo CEO Marissa Mayer pulled the rug out from under telecommuting employees. It won't help fix Yahoo's problems, but it's interesting to watch.
There are no sacred cows to someone who believes that consumer devices and self-service IT are the keystones of the new business model. IT Apologist Ken Hess takes on Consumerization and BYOD.
Are you getting tired of seeing the "Please move to Skype" messages from Microsoft? Oy, it's enough to make me kvetch!
If someone told you that each mobile computing mishap in your company would cost you almost a half million dollars, would you find that number compelling? Me too.
What if someone famous switched from iPhone to Android? What about two famous people? Andy Ihnatko and Guy Kawasaki both have taken up residence with Android phones. What's the world coming to?
How many times have you seen free services disappear, switch to non-free, restrict you too much or have no value — even free of charge? I've seen it more than I want to admit to.
Apple's eBay store is something of a mystery. Cheaper prices (mostly) on its refurbished hardware. Is there a story here? Inquiring minds want to know.
Consumers need to proceed with extra caution to avoid scams, viruses, social engineering attempts, privacy-leaking apps, and malicious software of every flavor. These guidelines will keep you on the straight and narrow.
Businesses need extreme security measures to combat extreme threats. Here are 10 best practices that provide defense against the majority of all security threats.
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.
Outside of the IT department, most users think that viruses are the only threat to their computing equipment. Many believe that malware doesn't affect mobile devices at all. An educated user is a safer user.
In a mobile security challenged world, Blackberry 10 might be just the ticket we've all been waiting for. Could it be that RIM is back in the game? Could be.
If you're going to allow users to bring their own devices, find out what you can do to maintain security and be a happier you. These ten security recommendations will help you do both.
Android's overwhelming popularity may be its undoing. Malware against Android exceeds threats against Windows. The threats are bigger and more is at stake than ever before.
To how many social networks do you belong? How valuable are they to you? If they went away tomorrow, would you feel any impact to your business? Good questions to ask yourself.
With user devices facing security threats from every direction and with no end in sight, BYOD should slow down a bit. The real question is, "What's the answer to this ongoing threat?" The answer may surprise you.