Ask and ye shall receive
Ken Dulaney, Gartner VP distinguished analyst and general mobile device guru, told the crowd at the Gartner Mobile & Wireless Summit today that he still can’t recommend businesses adopt the...
View ArticleCisco’s Motion Announcement
Cisco’s Motion announcement on May 28th was huge for enterprise mobility. It defined some new terms which we will be hearing a lot: “Cisco Motion,” “Mobility Services Architecture” and “Mobility...
View ArticleInformation Cards versus Open ID?
We all hate passwords – they are insecure and burdensome; but they seem so firmly entrenched that they will be around for a long time. The New York Times recently wrote a story about Information Cards,...
View ArticleITExpo: Enterprise SBC and UC Security Essentials
If you are going to ITExpo West 2012 in Austin, make sure you attend my panel on this topic at 10:00am on Wednesday, October 3rd. The panelists are Scott Beer of Ingate Systems, Jeff Dworkin of...
View ArticleITExpo: BYOD – The New Mobile Enterprise
If you are going to ITExpo West 2012 in Austin, make sure you attend my panel on this topic at 1:30 pm on Wednesday, October 3rd. The panelists are Jeanette Lee of Ruckus Wireless, Ed Wright of...
View ArticleEnterprise SBC and UC Security Essentials Discussion Group
The conversation at the IT Expo ‘Enterprise SBC and UC Security Essentials‘ session got so lively that one audience member requested an on-line continuation when we ran out of time. So if you are...
View ArticleBig Brother
Some ideas are so obvious once you hear them that you feel like you already had them yourself. One such is a new application for Wi-Fi from a company called Euclid Analytics. Euclid’s idea is to...
View ArticleMobile Security and HTML5
Smartphones and tablets have plenty of computing power to host malware, and they are simultaneously connected to the Internet via a cellular connection and to the LAN via Wi-Fi. So everybody in your...
View ArticleMobile Malware Update
Blue Coat Systems has published an interesting report on the state of mobile malware. The good news is that in the words of the report “the devices’ security model” is not yet “broken.” This means that...
View ArticleBYOD Cyber-Security. How concerned should you be?
According to ComputerWeekly.com, “Nearly half of firms supporting BYOD report data breaches.” PWC’s 2013 Information Security Breaches Survey said “9% of large organisations had a security or data...
View Article
More Pages to Explore .....