Implications of Mobile Devices on Security

Published: March 15, 2006 - 12:00am

Since attending the RSA Conference last month, I've been thinking about the implications of mobile devices on security... Here are three initial thoughts:(1) We want 'em, we gotta have 'em, we can't live without 'em! Give me the latest smart phone / PDA (as soon as my "New Every Two" eligibility renews, that is)! Give me a video iPod! Give me a bigger memory stick! Give me a higher-capacity flash memory card! I am sometimes accused of being a gadget guy, but the fact is I am not alone. The presence of these and other mobile devices -- in both the corporate and the consumer markets -- cannot be viewed as an option; it is a given. Their use is unstoppable, ubiquitous, indispensable, and irreversible. Employees expect it, and like it or not they will have it -- even if it means going unsanctioned and unsupported...

Hitting The Relational Wall Relational Database Management Systems (RDBMSs) have been very successful, but their success is limited to certain types of applications. As business users expand to newer types of applications, and grow older ones, their attempts to use RDBMS encounter the "Relational Wall," where RDBMS technology no longer provides the performance and functionality needed. This paper measures the wall, explains what model and architectural differences cause it, how to foresee it, and how to avoid it.

BPM and SOA: Better Together Find out how the standards-based modeling, monitoring, connectivity, and process integration tools that comprise IBM’s Process Integration suite are allowing companies to implement process automation components with greater speed and agility than ever before. Download this informative white paper to learn more.

Reap the benefits of Business Intelligence with HP Servers and Microsoft SQL Server The need for gathering an ever increasing amount of data and providing for storage, reporting and analysis of this data has placed enormous pressures on both IT staff and the computer infrastructure to deliver the right information, at the right time, for the right price. Read this whitepaper to learn why HP Integrity servers and HP enterprise storage, combined with SQL Server 2005, can create the critical Business Intelligence IT environment that Windows customers have been dreaming of.


( Related: Security )