The Latest in IT Security

Posts Tagged ‘Tech’

If there is one thing the last year has shown me in my global travels and work, it’s this: now is the time for CDOs to determine their grand vision for artificial intelligence and machine learning and how it will shape their business strategy. Why? Because the robots are not coming.

Read more ...

If Sheila Jordan and the rest of Symantec’s senior leadership team complete their vision they will transform the company into the Amazon.com of cybersecurity, essentially a one-stop shop where CIOs and consumers alike can buy digital tools to protect their data assets.

Read more ...

Research paper: “Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone,” by Patrick Ventuzelo, Olivier Le Moal, and Thomas Coudray. Abstract: VoLTE (Voice over LTE) is a technology implemented by many operators over the world. Unlike previous 2G/3G technologies, VoLTE offers the possibility to use the end-to-end IP networks to handle voice communications.

Read more ...


Categories

WEDNESDAY, MAY 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments