Saturday 30 April 2016

Photos from Vintage Computer Festival East; How do you secure mobile devices?

Top tech stories now available. See what’s trending today.
Subscription | Read Online Twitter Facebook Google+

Survey: How do you secure your mobile devices in the enterprise?

Mobile devices offer powerful productivity, but there is also the risk of security breaches. Tech Pro Research's survey looks at the best practices for securing these devices.

Photos: Apple II clones, an ENIAC emulator, and more from Vintage Computer Festival East XI

New at TechRepublic

Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge

Microsoft releases workflow automation tool Flow, and PowerApps custom app platform

Podcast: Business Technology Weekly - All the tech in China

The tough questions of ethical content creation in VR

GNOME privacy options give users even more desktop security

How to back up Windows 10 with Western Digital's My Passport Ultra

Why Ceph could be the RAID replacement the enterprise needs

6 ways to save links with free Google tools

Featured Multimedia

14 thrilling books about cryptography every IT pro will love

New from Tech Pro Research

New equipment budget policy

This Tech Pro Research policy enables the IT department to coordinate equipment purchases, standardize components based on job responsibility, and prepare for maintenance, repairs and upgrades.

Sign up for a Free Trial of Tech Pro Research and preview our articles, tools, policies, and templates.

Today's recommended downloads

Real advice from the pros: hybrid vs. private vs. on-premises cloud

(Microsoft)

Gartner Magic Quadrant for Business Intelligence and Analytics Platforms

(Microsoft)

Build Intelligent Web and Mobile Apps

(Microsoft)

IBM Cisco Maintenance Service (Japanese)

(IBM)

Need a New Business Partner?

(Telstra)

A special feature from TechRepublic and ZDNet

Integrating the Hybrid Cloud

As far and fast as cloud computing is embedding itself into the enterprise, there remain many cloud-resistant applications and services. We dive into the practical approach for integrating public cloud applications with private cloud services in a well-integrated hybrid cloud.

TechRepublic newsletters

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Click the newsletter title below to subscribe.

Download

Election Tech 2016

Download

TechRepublic Cover Stories

Connect with TechRepublic

Visit the Subscription Center to get other free newsletters, manage your account settings or to be removed from TechRepublic communications.

The e-mail address for your subscription is habib2best@gmail.com.

Unsubscribe | Send Feedback | FAQ | Advertise | Privacy Policy

© 2016 CBS Interactive, Inc. All rights reserved.

TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic

235 Second Street

San Francisco, CA 94105

U.S.A.

No comments:

Post a Comment