iPhone

iPhone - News, Features, and Slideshows

Features

  • 5 reasons you're going to want Apple's next iPhone

    Apple is cooking up such an iPhone upgrade path, with a wave of rumors warning the next iteration will be faster, thinner, and possibly even curvier than before.

    Written by Jonny Evans23 June 15 22:28
  • Top tech stories of 2013: Big Brother, wearables, and the struggles of aging tech giants

    Politics collided with the world of technology this year as stories about U.S. government spying stirred angst both among the country's citizens and foreign governments, and the flawed HeathCare.gov site got American health-care reform off to a rocky start. Meanwhile, the post-PC era put aging tech giants under pressure to reinvent themselves. Here in no particular order are IDG News Service's picks for the top 10 tech stories of the year.

    Written by Marc Ferranti09 Dec. 13 19:51
  • Have we reached gadget fatigue?

    Smartphones are everywhere, and smartwatches are poised to follow. Techies are eying Google Glass. And we now wear our technology on our sleeve. Have we finally reached gadget overload?

    Written by Tom Kaneshige05 Sept. 13 18:22
  • 5 BYOD pitfalls and how you can avoid them

    Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.

    Written by Tom Kaneshige20 June 13 00:25
  • What's behind Apple's mea culpa in China?

    Apple CEO Tim Cook's overboard apology to China about the company's alleged disregard of customer service highlights an East-West cultural clash about how to do business.

    Written by Tom Kaneshige03 April 13 23:03
  • How BYOD saved VMware $US2 million

    As more companies adopt a bring-your-own-device (BYOD) approach to mobile, many are getting caught by hidden costs. But virtualization titan VMware has bucked that trend. VMware CIO Mark Egan explains how his company accomplished its feat.

    Written by Thor Olavsrud01 Feb. 13 15:20
  • BYOD planning and costs: Everything you need to know

    Bring Your Own Device programs promise to remove the cost of smartphones from a company's balance sheet. But most companies transitioning from company-issued smartphones to BYOD aren't even breaking even.

    Written by Tom Kaneshige13 Dec. 12 20:05
  • Worst security snafus of 2012

    The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.

    Written by Ellen Messmer10 Dec. 12 17:57
  • Mobile Payments Are Just a Text Message Away

    Barclays Bank puts a personal spin on mobile payments with a person-to-person mobile app that lets customers send and receive payments via text messages between iPhone, Android and Blackberry mobile phones.

    Written by Lauren Brousell29 Oct. 12 17:54
  • Has RIM's BlackBerry had its day in the enterprise?

    They were once ubiquitous in the workplace, as much a symbol of executive status as the gold standard in enterprise mobile communications. Research in Motion’s (RIM) BlackBerry devices held all the corporate aces and with unrivalled high-end security features, their appeal to and grip on the enterprise sector seemed impregnable.

    Written by Mark Phillips16 Aug. 11 08:36
  • Apple iOS: Why it's the most secure OS, period

    In June 2007, Apple released the iPhone, and the device quickly took off to become a major brand in the smartphone market. Yet when the iPhone shipped, security on the mobile operating system was nearly nonexistent. Missing from the initial iOS (then called iPhone OS) were many of the security features that modern-day desktop software has as a matter of course, such as data-execution protection (DEP) and address-space layout randomization (ASLR). Apple's cachet lured security researchers to test the platform, and in less than a month, a trio had released details on the first vulnerability: an exploitable flaw in the mobile Safari browser.

    Written by Robert Lemos06 June 11 20:04
[]