A call for Kiwis to recycle mobile phones on International E-Waste Day
For every phone recycled with RE:Mobile, a donation will be made to local charity Sustainable Coastlines
For every phone recycled with RE:Mobile, a donation will be made to local charity Sustainable Coastlines
These have the potential to optimise or transform public services and should be included in the strategic planning of government CIOs over the next 12 to 18 months, says Rick Howard of Gartner
The fledgling unit is immediately doubling the number of drone flights it does for its flagship customer, Raleigh, North Carolina's WakeMed Health & Hospitals.
The app's surge in popularity and sudden backlash from some users highlights how artificial intelligence (AI) technologies bring about new concerns surrounding identity verification.
The new commitments step up the competition among tech companies aiming to show consumers and governments that they are curbing the environmental toll from their widening arrays of gadgets.
Weddings. Job promotions. News articles. Facebook thinks it knows what the best stories are to drop in your news feed. But some users might want to see things their own way.
Companies have accepted that BYOD is a reality. The challenge now is striking a balance between security and flexibility.
After traveling all day, the last thing you want to do is wait in a long line to check into your hotel. And when you finally get to the front desk, it seems like the hotelier has to type a million keystrokes into the computer before finally handing you your room key.
“By offering direct access to Office 365 on Cloud Exchange, we are helping our enterprise customers get the most out of their cloud investments."
When Patrick Benson joined Ovation Brands back in September 2013, he was given a tall order: modernize an array of legacy IT systems that could no longer keep up with the restaurant-chain conglomerate's business processes.
César Cernuda, President of Microsoft Asia Pacific, says a big part of Redmond’s strategy is not just to be a global company but to have local presence.
The risk of data loss and security breaches from mobile computing is substantial, whether it’s lost devices, hackers gaining entry via mobile employees or the steady stream of new threats coming out. The good news is that organizations can still reap the benefits of mobile computing by combining sound security policies with end user training, intelligent device selection and by taking steps to secure their most valuable data.