Searched for: "securing information in a mobile infrastructure"
- Mobility (60)
- Security (52)
- Networking (23)
- Cloud (9)
- Cxo (5)
- Developer (3)
- Google (3)
- Big Data (2)
- Data Centers (2)
- Data Management (2)
- Innovation (2)
- Social Enterprise (2)
- Virtualization (2)
- After Hours (1)
- Apple (1)
- Banking (1)
- Collaboration (1)
- Consumerization (1)
- Enterprise Software (1)
- Hardware (1)
- Microsoft (1)
- Printers (1)
- Software (1)
- Start-Ups (1)
About 178 results for "securing information in a mobile infrastructure"
As more workloads move to the cloud, so must security solutions. Matt Asay explains how the future of security is cloudy with a chance of Amazon.
A recent Deloitte survey found that security, cloud, and analytics are growing in importance among mid-market businesses. Here are some of the highlights from the report.
There's a lot of health-related data floating around in the world. IBM wants to help patients and healthcare providers make better use of it and keep it secure.
Mobile Ad-hoc NETwork (MANET) is a continuously self-configuring infrastructure fewer networks of mobile devices connected without wires. Each device in a MANETs is free to move in...
Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software system. Information ...
Mobile Ad hoc NETworks (MANETs) are collections of mobile nodes with links that are made or broken in an arbitrary way. No centralized controller and infrastructure. A major issue ...
The Mobile Ad-hoc Network is an autonomous system of movable nodes, this type of a wireless network where the movable nodes dynamically form a network to exchange information witho...
Launch Tennessee's 36|86 conference in Nashville saw a plethora of new startup pitches. Here are the best pitches from the first day of the conference.
Mobile ad hoc network is a group of wireless nodes that form a network without any kind of infrastructure support. Security in wireless ad hoc networks is hard to transmit the data...
Focus your print security strategy with the HP Secure Print Analysis tool. This quick assessment of your current print security infrastructure will tell you where to strengthen pri...