Facebook has recently announced 'Facebook at work' for connecting professional contacts. If you don't want to mix your business and personal lives, have a look at these social networks you can use for work.
Showing results 1 to 20 of 413
You might not hire a pickpocket to be a guard, but the UK's cybersecurity shortage has prompted a skill hire, no matter the origin.
China is high on the list of suspects as President Obama meets with the Chinese premier to discuss, among other things, cybersecurity.
Traditional device level network monitoring is having trouble keeping up with the increasingly virtualized computing environment. NetBeez believes that its tools offer a solution.
The FBI's director believes that Chinese hackers are not all that subtle, but are still prolific enough to break into networks and walk out with the goods — costing US businesses billions every year.
Telecommunications carriers often support networks many times the size of large enterprise networks. The problem is that each application or function is supported by separate networking equipment. ConteXtream believes that its SDN technology could improve performance while saving money.
According to new research, the enterprise is ready to capitalize on the Internet of Things — but network capacity and security is scuppering adoption rates.
We're leaving the era of standalone social networks and moving to a far more interconnected world. The digital enterprise approach combines vestigial point solutions and legacy applications into cohesive next generation systems of engagement.
Aruba is benefiting as 802.11ac wireless networks are being deployed in the enterprise.
Like any other enterprise, large educational institutions have existing computing infrastructures which are likely built around Windows networks. Adding Windows tablets to them is far easier than adding iPads or Android tablets
At today's Gartner Symposium, ITxpo 2013, BlackBerry has previewed a new enterprise solution to help businesses secure networks in a world of bring-your-own-device (BYOD) policies.
The U.S. carrier believes that an aggressive approach to enterprise security will help protect businesses against digital threats & risks including DDoS attacks, botnets and employees connecting to corporate networks with insecure and jailbroken mobile devices.
As part of the Knox security suite, Samsung has added an enterprise security package for Android-based smartphones.
The networking giant has fixed a number of vulnerabilities that could allow hackers to remotely execute commands or disrupt critical processes.
Instead of being used as spam during DDoS attacks, botnets are now used to bring down enterprise apps, leaving the more connected countries more vulnerable, according to Barracuda Networks.
Cupertino's got a giant war chest, but does it really want to be in the business of search engines, volume email services, social networks, productivity and enterprise software, and all the other things that are needed to complete the mobile picture?
IBM and 10gen are collaborating to fashion a new standard for mobile computing within enterprise networks.
The new enterprise IT landscape of cloud services, mobility and BYOD, social media usage and big data analytics creates very different types of network traffic to the traditional mix of in-house client-server enterprise workloads. How will networks evolve to keep pace?
The PC maker boasts that these new product will cut the cost of VDI in half, adding that the portfolio includes the first dual-core and quad-core thin clients to offer virus immune endpoint solutions for enterprise customers.
The enterprise space is getting more comfortable with social networking tools for internal communication and collaboration, according to the software-as-a-service provider's Marketing Cloud product director Derek Laney.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)