Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

MOBILE AND WIRELESS NEWS

How to upgrade to iOS 8 (and downgrade to iOS 7 if you regret it)

Sept. 18, 2014 | CHRISTOPHER BREEN

As summer winds down and autumn kicks in, it's time for another iOS update. And, just as predictably, a lot of iPhone, iPad, and iPod touch owners will want to make the leap from the previous operating system to the new one. If tradition holds, Apple will release iOS 8 at around 10 a.m. Pacific (1 p.m. Eastern) on Wednesday, and when it does, this guide will show you the way.

Read more...

iPhone 6 and iPhone 6 Plus: Bigger is in fact better (in the right hands)

Sept. 18, 2014 | JASON SNELL

When Apple released the first iPhone, its 3.5-inch touchscreen seemed huge compared to the displays of other phones. Nonetheless, competitors responded with even larger screens, trying to find areas where they could provide clear alternatives to Apple hardware. Consumers responded positively, so the competition started making even bigger phones.

Read more...

First impression: The real surprises in iOS 8 are the little things

Sept. 18, 2014 | MATT WEINBERGER

Like probably millions of others today, I upgraded my iPhone 5 to the brand-spanking-new iOS 8. I'm still wrapping my head around the major new features, like the problem-struckHealthKit, and I haven't been able to really fiddle with the major camera upgrades yet. But in just a couple of hours of normal usage, it's really the little tweaks to the experience that are standing out to me.

Read more...

BLOGS AND OPINIONS

MOBILE AND WIRELESS WHITE PAPERS

The Collaboration Paradox

British Telecom

In this whitepaper, we look at how new collaboration tools enable global executives to get more out of teams and make faster decisions. However, these teams feel restricted by outdated communication methods that lead to slower decision making and ultimately wasted time and money.

Download

Modern Threats Need Modern Threat Prevention

Check Point

What is the meaning of “threat” to the security of your organization’s network? In a practical sense, does this mean you should try to minimize the vulnerabilities of different applications? Or is there more?

Download

MULTIMEDIA