The latest in entrepreneurial technology news for Kiwis
These search results are from across the Techday Network of sites
Huawei tablet growth bolsters declining market while Windows is MIA
Huawei has bucked the downward trend in the tablet market, recording the only growth seen by tablet vendors in Q1, while Windows tablets began to drop
The $3T opportunity that isn’t: IoT opportunity ‘dramatically over-inflated’
IoT market value will be measured in billions, not trillions, come 2025, Strategy Analytics says. But services still present a big opportunity.
ASP rise offers some light at the end of the tablet tunnel
Apple's iPad has logged its best quarter in two years as consumers and enterprise alike opt for 'pro' devices, but the news isn't great for all.
Commvault's new platform solving problems you don’t know you have yet
The new platform allows companies to protect, access and use all of their data, anywhere and anytime – turning data into a powerful strategic asset.
Oculus, HTC and Sony to dominate VR spend with just 13% market share
Oculus Rift, HTC Vive and Sony Playstation VR will dominate VR spend this year - but its low cost options fuelling shipments.
Business tablet demand ramping up
The market for business tablets is ramping up as businesses shift computing models from PCs or laptops to two-in-one tablets, offering a growth area.
Wake up call: IoT security not up to scratch
“IoT environments exponentially increase the size of the attack vector since there are so many more devices, end points and applications to secure."
IoT to define the next decade, says experts
M&A activity will continue brisk throughout 2016 as large, established vendors strengthen their core capabilities and expand their IoT presence.
Big data analytics key differentiator in IoT deployments
Big data analytics is becoming a boom market and a big differentiator in IoT deployments - for enterprise, SMB and the channel.
Wave 2 of 802.11ac poised to be highest shipping Wi-Fi ever
The 802.11ac Wave 2 Wi-Fi standard is starting to gain ‘rapid’ traction and is poised to become the highest shipping Wi-Fi standard yet.
Has Windows' time come in the tablet market?
After languishing in single digit market share for several years, Windows is finally making a move in the tablet space.
Enterprise mobile business apps a growing market
The mobile enterprise business applications market offers good potential for the channel, with predictions the market will top US$40.5b in 2015.
Enterprise mobility management taking over traditional IT
Enterprise mobility management is about to take over many traditional IT management and security functions in the enterprise.
Tablets on the rise as upgrades and enterprise demand increase
The future for sales of tablets is looking considerably brighter with 7% growth predicted next year as upgrades and enterprise tablet use take off.
Analytics, services and security top spend for IoT
Big data analytics will play a pivotal role in enabling enterprises to gain benefit from the internet of things over the next 12 to 18 months.
IBM becoming Internet of Things powerhouse
“IBM is using its considerable resources to accelerate IoT deployments across a wide variety of verticals."
Whitepaper: How to build cloud policies your organisation can stand by
Done right, digital transformation can transform the way governments engage with citizens, make businesses more productive and help non-profits be more effective.
Whitepaper: The best way to get insights relevant to your business
A Design Sprint offers a framework for making progress and decisions when you have a new customer proposition.
Infographic: Why an outdated unified comms solution hurts your business
Seventy-one percent of IT professionals say their organisations use multiple communication or collaboration solutions unnecessarily.
Using SOLIDWORKS CAD to take an idea from prototype to product
Sound pioneer Nura had an ambitious concept to deliver when it raised almost two million dollars via crowdsourcing and then over five million dollars through a seed round.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?