Alice begins her workday staring at a white wall in order to get the best resolution with her smarteye. The smarteye contact lens projects light into her retinas having the best contrast with a...Read More →
The original Star Wars movie opened in 1977 when I was in sixth grade. I saw it five times because I loved the story and the characters. Inspired by the return of Star Wars to the big screen this holiday season, here are my enterprise mobility predictions for 2016.
2016 will be a year of battles, battles,...Read More →
A good friend of mine is fond of saying “The first thing to do in any crisis is panic, but once you’ve got that out of the way you need...Read More →
The security mindset that an entire organization must adopt if they plan to develop and manufacture devices or things that connect to the Internet, known as the Internet...Read More →
Four major mobile security exploits have been discovered on Android and iOS in the last two months. Modern mobile operating systems (Android, iOS, and Windows 10) are architected to be much more secure than traditional operating systems (such as Windows 7), but hackers are smart and determined and will...Read More →
It’s hardly uncommon for security policies and tools to be perceived as draconian or invasive. The consensus is that— more often than...Read More →