More than 1,200 new rootkits are detected each day. Here's how security experts combine hardware and software techniques for a new layer of protection.
When mobile operating system vendors update their platforms, third-party apps sometimes stop working. Here's why -- and how to prevent your app from being the next one that breaks.
Cloud computing helps enterprises reduce IT CAPEX and access the latest systems, but Virtualization for Dummies author Bernard Golden explains the danger in underestimating factors that affect cloud access and uptime.
Multicore processers are increasingly common in everything from PCs to smartphones -- and increasingly attractive to hackers. Cambridge University researcher Robert Watson explains the threats and how enterprises can mitigate them.
Markus Levy, president of The Multicore Association, illuminates initiatives developers should keep an eye on, including an API designed to make parallel programming easier.
Wireless machine-to-machine (M2M) communications gives enterprises new options for tracking assets, reducing overhead costs, ensuring employee safety and delivering value-added services. But what happens when the underlying wireless technology gets phased out?