Tek-Tips | Mobile and Wireless RSS feed for this section
Prying eyes steal customer data at a major EU Telco: How to avoid insider data theft

Prying eyes steal customer data at a major EU Telco: How to avoid insider data theft

This notification is possibly the first major breach made visible under the new tough EU Telecoms rules on data privacy. The data stolen includes “names, addresses, birth date, gender, bank sort code and bank account numbers for approximately 2 million applications from individuals seeking to sign up with Vodafone Germany”. The key word here is [...]

Read full story Comments { 0 }

BYOD Requires Secure Containers for Mobile Devices

The BYOD, or bring your own device, trend seems to be expanding. There are many aspects to BYOD, but the use of end devices, whether they are PCs, netbooks, laptops, smartphones, or tablets, for both personal and business uses opens up security problems. The business use by enterprises in general requires more stringent security measures, [...]

Read full story Comments { 0 }

Consumerization of IT Allows Consumer Experience to Improve Enterprise-Grade Products

In the recent Consumerization of IT in the Enterprise conference (CITE) by IDG, there were many interesting speakers. Most were from small or startup companies that preached how to use consumer-grade end devices for the enterprise business. The enterprise notoriously demands security, scalability, reliability, and durability. Those characteristics are seldom emphasized in consumer-grade devices. Instead, [...]

Read full story Comments { 0 }
Securing Emerging BYOD Trends

Securing Emerging BYOD Trends

The Bring Your Own Device (BYOD) and IT consumerization trends are growing, and enterprises are starting to embrace rather than fight them. Accepting these trends means facing several new problems and requirements to make sure these devices behave as trustworthy end devices in the corporate network. Under these new trends, an employee’s device will contain [...]

Read full story Comments { 0 }
Remote Control Is Everywhere, Thanks to Proliferation of Smart End Devices

Remote Control Is Everywhere, Thanks to Proliferation of Smart End Devices

With the proliferation of smart end devices, we can do what was not done easily or inexpensively before, thanks to innovations such as cloud, low-power yet powerful processors, high-capacity yet inexpensive storage, and enhanced wireless technologies. Many companies have come up with interesting technologies and products in this emerging market. People Power is one such [...]

Read full story Comments { 0 }
Latest Experian report highlights our love affair with smartphones – and the risk this poses to corporate data

Latest Experian report highlights our love affair with smartphones – and the risk this poses to corporate data

“By all means allow staff to use their smartphones to communicate on the move – using voice, text and basic email. But when it comes to risking the integrity of the company’s data, encryption at source is the best security defense possible.” – Dave Anderson, Voltage Security CUPERTINO, CA, May 30, 2013 — Commenting on [...]

Read full story Comments { 0 }
How to Apply ICT to the Power Grid: OSIsoft’s Way – Part 2

How to Apply ICT to the Power Grid: OSIsoft’s Way – Part 2

This is a continuation from Part 1. Interfaces required to multiple domains I think their decision to keep themselves a software infrastructure company is smart. In this way, they can apply their systems to many market segments where operations are involved. When operations are performed, some kinds of data are generated and often times those [...]

Read full story Comments { 2 }
How to Apply ICT to the Power Grid: OSIsoft’s Way — Part 1

How to Apply ICT to the Power Grid: OSIsoft’s Way — Part 1

Smart grid is where power, IT, and communications meet. In this blog, IT and communications technologies are grouped as ICT. These days, most industry areas have become so complex that we cannot cope with problems without applying ICT. When smart grid was first introduced, Cisco declared that the power grid would be much bigger than [...]

Read full story Comments { 0 }
Wind River’s View on M2M, Intelligent Systems, and the Internet of Things

Wind River’s View on M2M, Intelligent Systems, and the Internet of Things

I hear more and more about intelligent systems. Are they different from M2M and the Internet of Things? In a recent Design West, one of the themes was intelligent systems. What is it, and how is it different from M2M and the Internet of Things? I attended one informative session by speakers from a research [...]

Read full story Comments { 4 }
What’s on the Radar Screen of an International ICT Company?

What’s on the Radar Screen of an International ICT Company?

Fujitsu has been one of the most successful companies in Japan, and it also has operations worldwide, including North America. The revenue distribution is Japan, $36.1B (61.8%); EMEA, $9.9B (17.9%); APAC/China, $5B (15.6%); and the Americas, $3.5B (4.6%), for a total of $54.5B worldwide. Because I cover the intersection between ICT and energy, I wanted [...]

Read full story Comments { 0 }