Researchers propose new Android security framework that could aid BYOD schemes
The Android Security Modules (ASM) framework, proposed by U.S. and German researchers, would make it easier to install security modules on Android devices without the need for rooting or firmware...
View ArticleBYOD wave sparks big security concerns
To deal with the BYOD wave, Gartner recommends that companies roll out mobile data protection, mobile device management and fund special mobility strategy teams within IT to handle the issue. IT folks...
View ArticleDoes big data mean big risks for businesses?
Now that businesses have collected and stored all of this data, how are they going to protect it? And most importantly, how are they going to use if safely and legitimately? ISF's Steve Durbin outlines...
View ArticleCloud security market landscape, 2013–2017
Cyber threats are now a critical issue affecting the national security of nation countries worldwide. At the same time, the IT world is witnessing a wave of new innovation, and there are numerous...
View ArticleGigaom Research predictions for 2014
As the year winds to a close, the Gigaom Research curators set their sights on 2014, and share thoughts on what to expect, what not to. Gigaom Research predictions for 2014 originally published by...
View ArticleBlackberry purchases ‘virtual SIM’ startup Movirtu, will bring the technology...
Blackberry has acquired Movirtu, a London-based company that specializes in virtual SIM technology, it announced on Thursday. Originally, Movirtu’s business centered around shared phone service for...
View ArticleHow businesses are using mobile technologies
Gigaom Research's latest survey of IT buyers shows how companies are using mobile technologies in the enterprise now and what direction they are likely to take over the next several years. How...
View ArticleIBM goes all consumer-y in its bid for continued relevance
The week in cloud: IBM-Twitter deal shows how the gulf between enterprise IT and consumer IT has narrowed. IBM goes all consumer-y in its bid for continued relevance originally published by Gigaom, ©...
View ArticleWhat to expect in mobile in 2015
Health and fitness apps, the future of mobile payments, and the future of the mobile enterprise will dominate discussion in 2015. What to expect in mobile in 2015 originally published by Gigaom, ©...
View ArticleHow mobile backend is changing enterprise mobile app development
Mobile Backend as a Service (MBaaS) bridges traditional application platforms and mobile applications, allowing developers to rapidly build new mobile apps and mobile-enable legacy enterprise...
View ArticleEnd-user computing trends to watch in early 2015
Enterprise IT will face harsh realities around BYOD, Desktop as a Service will grow rapidly, and questions about Microsoft's future market share will abound. End-user computing trends to watch in early...
View ArticleVirtual desktops don’t replace EMM
A few weeks ago, a Gigaom Research client told me she was “sick of BYOD” and wanted out. She asked me if I thought she could “dump everything and just have employees remote into their desktops when...
View ArticleWith Android for Work, Google aims to secure 1+ billion BYOD devices
We’ve all been doing it, to the dismay to some of our bosses: Employees have long been bringing their own devices to work, reading corporate mail on the same phone that also is used to run their...
View ArticleHow work media tools are shaping business in 2015
Mobility, digital-work culture, and collaboration own the ever-evolving work-media landscape in 2015, and influence the business tools we use each day. How work media tools are shaping business in 2015...
View ArticleVirtual desktops don’t replace EMM
A few weeks ago, a Gigaom Research client told me she was “sick of BYOD” and wanted out. She asked me if I thought she could “dump everything and just have employees remote into their desktops when...
View ArticleWork IT: bring-you-and-your-own-everything
Cast your mind back a decade or more. Did you request specific hardware from your company’s IT team? If so, you started a trend that continues to play out to this day, and will continue to its logical...
View ArticleBYOD policies are behind the times, and we haven’t seen anything yet
A recent study by Champion Solutions Group showed some very surprising results. While we have come to rely on mobile devices as a critical aspect of business communications, the research found glaring...
View ArticleReport: Hybrid application design: balancing cloud-based and edge-based...
Our library of 1700 research reports is available only to our subscribers. We occasionally release ones for our larger audience to benefit from. This is one such report. If you would like access to our...
View ArticleReport: SDN, NFV, and open source: the operator’s view
Our library of 1700 research reports is available only to our subscribers. We occasionally release ones for our larger audience to benefit from. This is one such report. If you would like access to our...
View ArticleResearchers propose new Android security framework that could aid BYOD schemes
U.S. and German security researchers have proposed a new security framework for Android that would make it easier to install new security extensions – both enterprise and consumer — for specific...
View Article