• Kyocera Hydro Reach (Boost Mobile)

    Kyocera Hydro Reach (Boost Mobile)

    The Kyocera Hydro Reach for Boost Mobile isn't a particularly impressive Android phone, but for $99.The Hydro Reach is dustproof and waterproof, offers good screen visibility in sunlight, and has very loud call volume.
  • SAP's Apple Partnership Is All About HANA

    SAP's Apple Partnership Is All About HANA

    , though, it was on the lips of many executives when they were talking about the recently announced partnership between SAP and Apple.Access to the iPhone and iPad hardware is only part of the advantage SAP sees in iOS native apps, though.
  • The world's first smart ping pong robot wants to turn you into a champion

    The world's first smart ping pong robot wants to turn you into a champion

    Ever felt like you could use a highly skilled opponent to improve your ping pong game?Similar to how a batting cage hurls baseballs out like a pitcher, the Trainerbot sends ping pong balls at you like some sort of robotic Forest Gump.
  • iPhone Sales Slide As Chinese Smartphone Makers See Growth

    iPhone Sales Slide As Chinese Smartphone Makers See Growth

    Chinese manufactures like Oppo, Xiaomi, and Huawei continue their strong performance, while Apple sees a double-digit slide in iPhone sales, according to the latest statistics from Gartner.The three Chinese brands -- Huawei, Oppo, and Xiaomi -- achieved 17% of the market, indicating Chinese brands are emerging as the new top global brands.
  • YouTube Prepping Standalone VR App

    YouTube Prepping Standalone VR App

    But your favorite cat videos are about to get even more mesmerizing.As part of Google's new Daydream VR platform, YouTube on Thursday announced its own virtual reality app, promising "an easier, more immersive" way to discover content.
  • Google's Virtual Reality Vision Comes Into Focus

    Google's Virtual Reality Vision Comes Into Focus

    It's safe to say that Google has a vision for virtual reality that is coming into focus.The cheap, foldable VR viewer was Google's first real foray into VR from a hardware perspective.
  • Google Opens Chromebooks To Android Apps

    Google Opens Chromebooks To Android Apps

    The move that will eventually make the more than a million Android apps available to Chrome OS users has been long expected.Technology that allowed this was announced at Google I/O 2014 and debuted for a handful of Android apps later that year.
  • 10 Great Tech Gifts For Grads

    10 Great Tech Gifts For Grads

    The class of 2016 is moving on to higher education or into the working world.The days are getting longer, weather is getting warmer, and summer is nearly here.
  • How does a vest burn fat by cooling you down? It’s complicated, and contentious

    How does a vest burn fat by cooling you down? It’s complicated, and contentious

    That explains Thin Ice in a nutshell, a vest that uses patent-pending cooling technology to help trigger weight loss.Part of the reason it’s such a contentious topic is that the vest’s fat burning technique seems completely counterintuitive.
  • Breach Preparation: Plan for the Inevitability of Compromise

    Download This eGuide includes observations from a data forensics expert, an attorney who works closely with board-of-directors-level management, a crisis communications professional, and an incident responder and technical expert.These viewpoints deliver a comprehensive insight into the best practices, technologies and solutions that are used to try and avoid or mitigate the effects of cyber attacks.
  • Gone Phishing: 2015 Global Malware Round Up Report

    Download Last year, the information security community witnessed some of the world's most devastating data breaches resulting from deadly malware strains and carefully executed phishing attacks.PhishMe's research team spent the last 12 months compiling the latest phishing intelligence and malware trends into an executive white paper - Gone Phishing: 2015 Global Malware Round Up Report.
  • Privilege Account Management Report & Action Plan to Protect Your Company

    Privilege Account Management Report & Action Plan to Protect Your Company

    Download Setting up Privileged Account Management (PAM) should be your #1 priority for mitigating Information security risks and improving cyber-attack resiliency.This requires understanding the challenges of Privileged Account Management and developing an action plan to protect your privileged password "keys to the kingdom.
  • From Cost-Center to Profit Center: How Investing in Commercial Operations Drives Growth for Medtech, and 3 Strategies for Getting Started

    Download In a commercial environment that becomes more complex by the day--due to factors such as increasing margin pressures, evolving customer-buying processes and the industry's increasing focus on outcomes--new technology holds promise for medtech companies to overcome these challenges and turn them into opportunities.However, many firms consistently fail to capture that promise.
  • Data Protection & the Insider Threat

    Download User and Entity Behavior Analytics has emerged as a critical part of a robust information security strategy, enabling the detection of threats that would otherwise go undetected.The barrage of data breaches and thefts caused by actual insiders, and by external actors impersonating insiders via compromised credentials, has led many to seek new approaches to increase their ability to protect sensitive data and intellectual property.
  • Threat Hunting - Open Season On The Adversary

    Threat Hunting - Open Season On The Adversary

    Download In 2016, three absolute facts are relevant when it comes to security: 1) an organization cannot prevent all attacks; 2) an organization's network is going to be compromised; and 3) 100% security does not exist.This means that adversaries will breach your organization's protection-if they haven't already.
  • Microsoft Developing Bing Concierge Bot

    Microsoft Developing Bing Concierge Bot

    The Bing assistant sounds as though it will function similarly to the Google Assistant bot, which was announced at this week's Google I/O conference.News of the Bing Concierge Bot originally came from a recent Microsoft job posting, spotted by ZDNet's Mary Jo Foley.
  • 2016: Current State of Cybercrime

    Download There is a truism in today's clickable economy: wherever there is commerce, there is also the risk for cybercrime.Whether a financial institution, an Internet storefront that does business with online shoppers, and now even hospitals with the rising tide of ransomware, cybercrime has no boundaries.
  • Anatomy of a Bounty Brief

    Download There are two sides to every bug bounty--the company running the program and the researchers submitting to it.From years of starting, managing and running our own programs, we've compiled some of the most important parts of a bounty brief.
  • How to Protect Your Business From Ransomware

    Download Ransomware is on the rise.As businesses brace for attack, we can't help but wonder: What would you do if your company were hit with ransomware?
  • Gartner Magic Quadrant for Operational Database Management

    Gartner Magic Quadrant for Operational Database Management

    Download When it comes to managing your data, the choice is clear: Microsoft is an industry leader in operational database management systems (ODBMS).Don't take our word for it; read Gartner's assessment of the ODBMS landscape and see how Microsoft stacks up.