Posts tagged for “Mobile devices”

Security

The Seismic Security Shift of 2011

March 1st, 2011

Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.

Continue reading...

Security

Spotted: Secret meeting of the secret club

February 4th, 2011

Unisys Backup as a Service can provide the scalability, the flexibility and reliability to handle the epic increase in the amount of data and variety of devices that now full under the purview of corporate control, and do so with a degree of flexibility, scalability and reduced cost that suits the needs of the modern enterprise.

Continue reading...

Security

IT Security 2011: Risk Interlinked

January 27th, 2011

Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.

Continue reading...

Security

The Communication Gap

October 26th, 2010

Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.

Continue reading...