abstract

Is your top 1% actually your weakest link?

2015 saw Barbie get hacked, “smart” homes turn against their owners and most infamously, subscribers on the Ashley Madison website...

Sponsored By: CA technologies

How safe are home security systems? An HPE study on IoT security

How safe are home security systems? An HPE study on IoT security

The intent of these systems is to provide security and remote monitoring to a homeowner, but the owner of the...

February 18th, 2016 IT World Canada Team

Data

2016 CES winners share success secrets for the enterprise

Two top serial entrepreneur winners (iHeartLocal) for the 2016 CES Mobile Apps Showdown share their success secrets which are useful for enterprise...

January 26th, 2016 Stephen Ibaraki

Best Practices for Building a Mobility Strategy

Best Practices for Building a Mobility Strategy

By delivering a mobile workspace that combines applications, content and communications services optimized for any networked device, user and location,...

January 1st, 2016 IT World Canada Team

Enterprise Mobility: Securing a Productive and Competitive Future

Enterprise Mobility: Securing a Productive and Competitive Future

Cisco has embraced an “Any Device” vision to allow greater choice in devices while maintaining a common, predictable user experience...

January 1st, 2016 IT World Canada Team

Secure the Mobile Enterprise

Secure the Mobile Enterprise

...

October 28th, 2015 IT World Canada Team

kensington

A visual reminder that less clutter on a desk doesn’t mean less complexity for IT departments

The paperless office might be saving trees, but connectivity may or may not be saving IT departments money. As workers...

August 5th, 2015 Gary Hilson

95448967

Seamless engagement for midsize companies

...

July 21st, 2015 IT World Canada Team

mobile device management

Start innovation from the user

The best advice I ever received when I was looking to start a consulting business was this: "To guarantee success,...

June 18th, 2015 Kevin Pashuk