Mobility

How Mobility Has Become the New Normal

mobile-workforce-470

Today’s worker no has longer has just one device, no longer works in one place, no longer stores data on a single desktop – the new normal has become mobility. Find out how Google is making a direct impact on worker and consumer mobility. Read More

Fundings Galore: Boundary, Ineda, IPO for MobileIron

IT Infrastructure Monitoring solution provider Boundary raises $22 million in a C-round of funding, MobileIron files for an IPO hoping to raise as much as $100 million, and startup company Ineda Systems has raised $17 million to advance its low-power SoCs for the Internet of Things market. Read More

IBM Issues Watson Mobile Developer Challenge

The IBM Watson supercomputer.

At Mobile World Congress this week in Barcelona IBM is encouraging mobile developers to create apps powered by Watson, Cisco’s Quantum virtualized packet core has passed portability testing, and Radware announces a SDN and NFV solution strategy for mobile carriers and service providers. Read More

Citrix Offers Big Data Analytics for Mobile Carriers

At the Mobile World Congress in Barcelona this week, Citrix (CTXS) launched a new big data analytics solution designed to provide actionable intelligence for mobile operator monetization, and added enterprise mobility management support for Intel Device Protection Technology. Read More

Broadcom Launches Open NFV Platform and Multiple SoCs

broadcom-logo

Gearing up to showcase a number of new technologies and innovation at Mobile World Congress next week in Barcelona, Broadcom announced a new Open Network Function Virtualization platform, a global location chip for wearables, and a single-chip millimeter wave system on a chip capable of 10 Gbps. Read More

Creating Enterprise Data and Mobility Security

cloud

As more users utilize mobility, creating enterprise-ready data and mobile device security controls becomes critical. There are some inherent benefits to creating corporate mobility – productivity, worker happiness, less end-point management – but there are also many concerns. Let’s take a look at how to create policies and security approaches that alleviate the risks involved. Read More