New Android bug renders device silent, unresponsive 
By Allie Coyne | 3 days ago | Comment Now 
Denial-of-service flaw affects more than half of all current users.
 
Telco fraud investigator arrested for fraud 
By Allie Coyne | Jul 15, 2015 | Comment Now 
Allegedly gave out free mobile phones, embezzled cash.
 
Unify Your Network for a Mobile Enterprise 
Jul 10, 2015 | Comment Now 
In order for a corporation to embrace the personal cloud era, it must transform to a mobile enterprise.
 
Xen patches admin privilege escalation vulnerability 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Allows admins with limited privileges to take full control.
 
Google brings security key to enterprise, education clients 
By Allie Coyne | Jun 30, 2015 | Comment Now 
Physical hardware aimed at blocking phishing.
 
Tech giants back Open Container Project 
By Juha Saarinen | Jun 23, 2015 | Comment Now 
CoreOS, Docker unite to standardise containers.
 
CBA launches single-view banking app for tablets 
By Paris Cowan | Jun 19, 2015 | Comment Now 
Forecasting and visualisation to gamify financial management.
 
Defanging Venom hypervisor attacks 'easy': researcher 
By Juha Saarinen | May 18, 2015 | Comment Now 
Single configuration change required.
 
Master the mobile moment 
May 15, 2015 | Comment Now 
Build mobile apps that build loyalty through a great user experience.
 
Measure what matters 
May 15, 2015 | Comment Now 
For mobile apps, the user experience is everything. Make sure you’re measuring it - completely and correctly.
 
HP AppPulse Mobile 
May 15, 2015 | Comment Now 
Measure the user experience, understand the business impact.
 
The user experience is everything 
May 15, 2015 | Comment Now 
Give users a great experience or they’ll give you the finger.
 
What's your FunDex? 
May 15, 2015 | Comment Now 
Track the user experience of your mobile apps with a single, meaningful score
 
Failing to meet mobile app user expectations 
May 15, 2015 | Comment Now 
A mobile app user survey
 
ACCC to cut costs of mobile calls, SMS 
By Juha Saarinen | May 6, 2015 | Comment Now 
Wants termination rates chopped in half.
 
Don’t let big data get you into big trouble 
By Juha Saarinen | May 5, 2015 | Comment Now 
[Blog post] Think before you download unsigned, unauthenticated code.
 
Google backs Docker container rival CoreOS 
By Allie Coyne | May 5, 2015 | Comment Now 
Appc gains ground with inclusion in Kubernetes.
 
Mobile security threat 'overstated': Verizon 
By Ry Crozier | Apr 14, 2015 | Comment Now 
Telco data set shows no cause for alarm.
 
Australian internet data usage breaks exabyte barrier 
By Juha Saarinen | Apr 2, 2015 | Comment Now 
Fibre connections grew 94 percent in 2014.
 
Govt takes slow steps in review of spectrum for emergency services 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 784

Vote