Mobility

Smartphones, Bluetooth, WiFi, and other mobile technologies are driving the gig economy and changing the worlds of entertainment, communications, and computing. Stay ahead of the pack with these valuable white papers.

  • Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry

    Podcasts // Feb 2015 // provided by SecurityTube.net

    Password entry on mobile devices significantly impacts both usability and security, but there is a dearth of usable security research in this area, specifically for complex password entry. To address this research gap, the speaker set out to assign strength metrics to passwords for which they already had usability data, ...

    Listen Now
  • Rethinking Mobile Security

    Podcasts // Sep 2014 // provided by Palo Alto Medical Foundation

    In this podcast, the speaker will discuss the changing threat landscape for mobile platforms, and how this drives a corresponding set of new requirements for security. Instead of being shackled to past principles and philosophies, learn about approaches to security that enable and extend (rather than restrict) access to mobile ...

    Listen Now
  • Ten Secrets to Secure Mobile Applications

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Many high profile mobile apps have been in the news for failures to use encryption, bad web service design, and privacy violations against users. Join them to get a grasp on how to threat model mobile applications and what the top vulnerabilities and solutions are for them.

    Listen Now
  • Runtime Manipulation of Android and iOS Applications

    Podcasts // Sep 2014 // provided by SecurityTube.net

    With over 1.6 million applications in the Apple AppStore and Google Play store, and around 7 billion mobile subscribers in the world, mobile application security has been shoved into the forefront of many organizations. Mobile application security encompasses many facets of security. Device security, application security, and network security all ...

    Listen Now
  • Mobile Security Attacks: A Glimpse From the Trenches

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Hackers today apply covert and persistent techniques to attack mobile devices. In this podcast, the speaker will explain about the latest threats on mobile devices from the team who uncovered iOS malicious profiles and HTTP request hijacking. The speaker will describe and demonstrate emerging mobile security threats: from physical, through ...

    Listen Now
  • Security and Wireless Emergency Alerts

    Podcasts // Jun 2014 // provided by Carnegie Mellon University

    The Wireless Emergency Alerts (WEAs) service depends on Information Technology (IT)-computer systems and networks-to convey potentially life-saving information to the public in a timely manner. In this podcast, the speakers discuss guidelines that they developed to ensure that the WEA service remains robust and resilient against cyber-attacks.

    Listen Now
  • Basics of Hardware Snapshots

    Podcasts // Apr 2014 // provided by CommVault Systems

    CommVault’s Phil Philip Curran (@PhilJPhilip Curran) discusses how integrated snapshots and data replication technologies can quickly create multiple recovery-ready copies of production data without impacting server performance. In addition, CommVault’s deep integration with VMware vStorage APIs for data protection (VADP) helps customers protect their virtual machines as they come online.Learn ...

    Listen Now
  • T-Mobile Podcast

    Podcasts // Feb 2014 // provided by Hewlett-Packard (HP)

    Learn how wireless services provider T-Mobile US, Inc. improved cloud- and data-access services delivery to its enterprise customers. Listen to the podcast featuring Daniel Spurling, Director of IT Infrastructure at T-Mobile US, Inc and understand now T-Mobile moved from manual cloud provisioning services to a centralized service portal to better ...

    Listen Now
  • The Manager of Managers Approach to Running Your IT Environment Virtual Event

    Podcasts // Jan 2014 // provided by Hewlett-Packard (HP)

    Do you have a single console to view, control, and manage your IT environment? Is automation built into your monitoring strategy? As IT environments become more dynamic, your operations teams need a unified view for management and monitoring. Automatic detection, and automated monitoring setup and configuration are two ways to ...

    Listen Now
  • Thinking ahead: Pragmatic steps for successful cloud transformations virtual event

    Podcasts // Jan 2014 // provided by Hewlett-Packard (HP)

    Public, private, or hybrid, the cloud is creating an array of opportunities for business and IT. And it’s reshaping IT as we know it. But incorporating cloud technology and services into the data center can entail multi-year transformations. The key to successful cloud transformations is developing a pragmatic strategy and ...

    Listen Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?