TECH SPOTLIGHT

Voice Biometrics Goes Mainstream - and Mobile

12/27/2011
Banks, telcos and government agencies are just three examples of the organizations that are leveraging voice to streamline and enhance authentication, including on mobile devices.

Managing Advanced M2M Applications

12/20/2011
A new generation of M2M technology is creating revolutionary changes in how people communicate with machines and how machines communicate with each other. Here's what you need to know.

Many Devices - One Cost Management Strategy

12/5/2011
The best job of mobile device cost management today is to take a simple – but consistent and aggressive – approach: combining a few targeted tactics to deliver the highest ROI with the least amount of effort.

Mobile Workers: Are Your Documents Secure?

11/16/2011
Protecting data is a critical mobile concern. Yet too many large and small businesses fail to do so - a risk no company can truly allow. Here is a start at a game plan.
 |<  <  13 14 15 16 17 18 19 20 21 22  >  >| 

MOST READ STORIES

topics

Must See


FEATURED REPORT

Mobile Risk: Security Is Not a Game

IDC predicts 2 billion mobile devices will be shipped by 2017, while Gartner expects a 26 billion Internet of Things installed base (excluding smartphones and tablets) by 2020. With more devices, more machines, more connectivity comes more risk.