article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops.

Mobile 142
article thumbnail

A Closer Look At Google’s 5G Mobile Edge Cloud Strategy

CTOvision

Through the Global Mobile Edge Cloud (GMEC) strategy, Google and telecom companies will offer unique applications and services running at the edge delivered via the 5G networks. Last week, Google shared its vision for enabling telecommunication providers to deliver business services through 5G networks.

Mobile 241
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Three Essential Mobile Security Measures

CTOvision

Read Andrew Hoog explain the three essential mobile security measures every company should adopt on DZone Blog : Many of us have heard of the 80/20 rule, also known as the ‘Pareto Principle.’

Mobile 206
article thumbnail

Mobile-Flex: Transformative Technology that simplifies mobile technology

CTOvision

Mobile-Flex® is a Windows Based Server solution that delivers access to any Windows server application on mobile devices, Windows desktops, Surface and Macintosh computers in a safe and secure manner using our patent pending technology that leaves NO trace of data of any nature on the device. To read more please log in. . .

Mobile 258
article thumbnail

Reaching Unreachable Candidates

Speaker: Patrick Dempsey and Andrew Erpelding of ZoomInfo

We have added 10's of millions of personal emails and mobile records. Advanced search: Narrow the search to find candidates using specialized filters like education, and current company technologies. Basic search: Easily search using keywords, job title, location, industry, and more.

article thumbnail

Forrester Online Survey: Organize To Deliver And Manage Application Transformation

Forrester IT

Every company faces a central dilemma: how to resolve the standardization and differentiation of its business apps to win, serve, and retain customers. We have been wondering how much the move to cloud, mobile, and embedded machine learning or artificial intelligence will […].

article thumbnail

T-Mobile investigating hack that affected 37 million customer accounts

GeekWire

(GeekWire File Photo / Taylor Soper) T-Mobile disclosed in a regulatory filing Thursday that a hacker obtained data from about 37 million customer accounts using an API, or application programming interface. 25, and T-Mobile identified the bad actor Jan. The Bellevue, Wash.-based The hack started on or around Nov.

Mobile 133