Remove Applications Remove Authentication Remove HP Remove Mobile
article thumbnail

Application List Report

Mick's IT Blog

We have started the Windows 10 upgrades and part of this process is installing applications for users that are not included in the standard build. I wrote this PowerShell script that can be executed as a package in SCCM against machines to generate an application report. The problem with that is it is a blanket report.

article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

We’ve migrated to a userid-password society; as we’ve added layers of security, we password-protect each layer: PC (and now device), network, enclave, application, database, and storage (encryption). It’s much easier to use biometrics or a SmartCard to identify yourself to a system or application.

Security 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Managing Mobile Business Insecurities

CTOvision

Today about 75% of mobile apps fail the most basic security tests, and that number is probably going up not down. 57% of mobile device users are not aware of the security solutions that exist on their devices. billion of mobile devices will have security applications installed. In 2018, 1.3

Mobile 273
article thumbnail

Liveblog: VMworld 2017 Day 1 Keynote

Scott Lowe

This brings him to reviewing VMware’s vision: any cloud, any application, any device. Digging in a bit deeper into VMware’s any cloud-any application-any device vision, Gelsinger talks about VMware’s goal to support any application across any modality of access, and this leads him to a mention of Workspace ONE.

Vmware 60
article thumbnail

Easier IoT Deployments with LoraWan and Helium

Phil Windley

Wifi has limited range and, outside the home environment, usually needs a separate device-only network because of different authentication requirements. Wifi is also power hungry, making it a poor choice for battery-powered applications. Photo Credit: Helium discharge tube from Alchemist-hp ( CC BY-NC-ND 3.0 ).

Network 95
article thumbnail

VMworld 2014 Day 2 Keynote

Scott Lowe

Poonen uses an example of a rooftop infinity pool in Singapore as a metaphor for the “three foundations” of EUC: SDDC, workspace services (authentication and content collaboration, for example), and then the desktop/mobile/cloud experience. Horizon delivers a unified application publishing and VDI solution.

Vmware 63