State of Cloud Security 2014
By Gadjo Cardenas Sevilla Everything from web-based email to storage services like OneDrive and Dropbox rely on cloud computing networks to work. How safe are today’s cloud services?
By Gadjo Cardenas Sevilla Everything from web-based email to storage services like OneDrive and Dropbox rely on cloud computing networks to work. How safe are today’s cloud services?
Text and photos by Ted Kritsonis
The annual Canadian Wireless Trade Show that took place in Toronto Oct. 29-30 catered as much to retailers and business users as it did consumers, and glass screen protector manufacturers were among those hawking their wares.
Text and photos by Ted Kritsonis
Even the less discerning consumer probably recognizes that Samsung doesn’t seem to be shy in experimenting with its device lineups, and tablets are no exception. The Tab S line, coming in 10.5- and 8.4-inch models, is the most recent and most audacious in its attempt to fight against the dominance of Apple’s iPad. Its ability to compete is made obvious on paper, but it’s the user experience that makes all the difference.
By Christine Persaud
For many women, the demands of a career often come alongside the demands of a family. Organizing one’s life typically means a combination of planning for that big meeting or business trip while also making sure you make the PTA meeting, help the kids with their homework, and pick up groceries.
By Ted Kritsonis
Flagship smartphones are typically the best on the market, and the cost of entry is high for some, regardless of whether you go on contract or purchase outright. That may make it hard for the budget-conscious to get a high-end device, but there are some affordable options in the mid-range that won’t necessarily break the bank.
By Ted Kritsonis
The Slingbox has been a rare case in that it has essentially offered the same core functionality and gone through few makeovers, yet has evolved enough on both the hardware and software sides to make the cost of entry more affordable with the M1.
They built see-through temperature-sensing and phone-authentication processes right in the screen in order to demonstrate the potential of their innovation.
by Lee Rickwood
By Gadjo Cardenas Sevilla There have been many recent cases of massive cloud service breaches and failures resulting in loss of privacy and personal information. Here are some tips to consider.