Posted on 20th Nov 2012 by Anvay Lonkar
What springs to mind when you think of McDonalds? Happy meals? Brightly colored fast-food chains? Sponsorship of the 2012 Olympics? Vegetarian-only restaurants in India? How about Machine-2-Machinecommunication? Surprised? McDonalds has pioneered a key business concept – extended enterprise – which is going to be the cornerstone of future M2M Communications. What is an extended enterprise? [...]
Posted on 20th Jun 2012 by Silvia Candido
Smartphones are spreading like wildfire, with Australia, the UK, Sweden, Norway, Saudi Arabia and the UAE all boasting smartphone adoption rates above 50% and, according to Nielsen in February 2012, almost half of all US mobile subscribers now also own smartphones – an increase of 38% compared with 2011. Smartphones are fast replacing feature phones and [...]
Posted on 10th Feb 2012 by Tim Cawsey
Today, dear reader, our blog is one year old. That’s right – our very first post was 365 days ago on 10th February 2011. We feel we have grown with the blog, expanding our hub to include a telecoms blog and one focused on enterprise security covering a multitude of topics and industries. While ‘Digital [...]
Posted on 16th Jun 2011 by Ray Wizbowski
Whether you like Ms Spears’ music or not, according to @forrester’s Marc Cecere, every business should strive to have someone overseeing the technologies and taking responsibility for the overall goal and destination.
Posted on 31st May 2011 by Ray Wizbowski
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.