Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
As innovation becomes evolution, the excitement around new tablets and smartphones will diminish and the post-PC era will inevitably end - not with a bang, but with a whimper.
We've collectively been playing "catch up" ever since and it's represented a business threat and an opportunity which has only recently seen MDM technology protecting the businesses' data assets whilst allowing staff to procure equipment they know and love.
By and large, the more pragmatic businesses will have caught up and will have methods for protecting their data and IP assets whilst leaving the rest of the device to the mercy of the user. The threat has been contained in responsible organisations.
As innovation becomes evolution, the excitement around new tablets and smartphones will diminish and the post-PC era will inevitably end - not with a bang, but with a whimper.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
What is model collapse and why is it a risk for enterprise AI?In-depth Model collapse is a nightmare for AI companies and users, with AI models trained on AI data losing quality with each generation
-
Developers are slacking on AI-generated code checksNews While organizations are aware of the risks, many are spending little time or effort on tracking artifact versions, origins, and security attestations
