Skip to main content
Main Menu
  • Device suitability - just how much of your body does your mobile device demand?

    Despite the future simplicity of interacting with technology demonstrated in sci-fi such as Star Trek - pocket-able communicators, talking to computers, and getting medical information from a handheld scanner - the reality of mobile technology in the workplace can still be a huge let down. The IT and telecoms industries have delivered on the flip phone visual promise and computer portability of Star Trek, but the wealth of features found on a mobile phone, laptop or handheld computer means they are often complicated to use and offer more features than the average worker needs.

    Read more
  • Preventing data loss - what's needed? The search for standards

    The UK's MPs may rue the day a disk listing details of their expenses was leaked to the Daily Telegraph from the House of Commons Fees Office earlier this year, but they were going to be made public at some point anyway, courtesy of the UK's Freedom of Information Act which the MPs themselves passed in to law in 2000.

    Read more
  • Finding MeMo (Memorable Mobile applications)

    "Mobile application stores - should they be controlled by handset manufacturers?" This question was circulated among members of the Mobile Data Association (MDA) group on linkedin last month, and it was clear from the responses and other recent announcements from across the industry, that this is a key battleground for the many different players in the mobile ecosystem. As well as the handset vendors such as Palm, BlackBerry or Nokia and software platform vendors like Microsoft, these also include mobile operators who have devices tailored or tuned to their specifications and networks, and a number of independent portals who offer applications across all networks and devices.

    Read more
  • Security on the move

    With data breaches a seemingly everyday occurrence, more could be done to protect data from loss. This article discusses the role that encryption plays in protecting data stored on mobile and portable devices.

    Read more
  • Should encryption be optional?

    The use of encryption can be considered best practice for protecting data on the move from loss or theft, but now it is no longer optional for many.

    Read more
  • The informed traveller

    A recent event co-hosted by the Mobile Data Association and the Location and Timing Knowledge Transfer Network, looked at new and emerging location based technologies and applications that have the potential to change the way people and professionals plan their journeys and travel.

    Read more
  • The state of play at CA

    Software vendor CA recently played host to the Industry Analyst community with a mid year update. Some bright indicators are to found in the company's position, while a few product challenges remain to be addressed.

    Read more
  • How to secure your on-the-go data

    The use of encryption is key, but identity management and DLP have their parts to play.

    Read more
  • Social networking and systems management - an unlikley combination?

    Can social networking actually be useful? There are plenty of claims made about Twitter's usefulness for getting concise messages to a broad audience or using LinkedIn to track down old colleagues who may be able make an introduction to a new prospect. But what about direct benefits - such as finding quick solutions to problems or getting better deals on products?

    Read more
  • Policy everywhere, with little to link it

    As Quocirca discusses in its freely available report "Content Security for the Next Decade" policies that define the way data must be handled are fundamental to good e-security practice, but where do you store the associated e-security policies? A written set of policies for handling data should be the starting point and such a document should be readily available to all employees and, where relevant, external data users for a given organisation. But policy can be enforced through a range of security tools in various parts of the IT infrastructure and this can lead to policy needing to be defined in several places.

    Read more

Pages