Standards  >   Network Protocols  >   TCP/IP  >   IP  >  

Mobile IP

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Wireless Internet Protocol, Wireless IP, Mobile Internet Protocol
DEFINITION: An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than  … 
Definition continues below.
Mobile IP Reports
1 - 25 of 225 Matches Previous Page  |  Next Page
Is Your Lack of Mobile Security Affecting Your Workforce Productivity?
sponsored by Dell and Microsoft
WHITE PAPER: In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.
Posted: 19 Jun 2017 | Published: 31 Oct 2016

Dell and Microsoft

It's Time for Field Service to Embrace Mobility
sponsored by Sprint
WEBCAST: In this webinar Zeus Kerravala of ZK Research talks about new ways to mobilize your workforce and why Mobility-as-a-Service makes so much sense. Watch to discover a smart, new way to think about mobility.
Posted: 14 Jun 2017 | Premiered: Feb 22, 2016

Sprint

Mobile Vision 2020: The Impact of Mobility, IoT, and AI on the Future of Business Transformation
sponsored by IBM
ANALYST REPORT: Learn how to secure disparate mobile endpoints in this report, and also illustrated is how to move from a siloed mobile management approach to a more consolidated and cognitive one. See how unified endpoint management (UEM) delivers the device-agnostic mobile approach enterprises need, and more.
Posted: 02 May 2017 | Published: 31 Mar 2017

IBM

Unified Management of Endpoints, End Users and Everything in Between
sponsored by IBM
RESOURCE: Discover how to relieve traditional MDM shortcomings with cloud-based unified endpoint management (UEM). Read on to alleviate the pains of securing a heterogeneous pool of endpoints by learning how to choose the right UEM tool, manage wearables and IoT, consolidate security views, and more.
Posted: 01 May 2017 | Published: 31 Mar 2017

IBM

Augmented Reality Mobile Technology Still 'Experimental' in the Enterprise
sponsored by Dell EMC and Intel®
EGUIDE: Pokémon Go brought augmented reality (AR) technology to the masses. In this guide, our experts illustrate the basics of AR in the mobile enterprise, and how to overcome adoption roadblocks such as cost, lack of development tools, and more. Read on to dive into the state of the AR market and evaluate its adoption readiness in your enterprise.
Posted: 06 Apr 2017 | Published: 03 Apr 2017

Dell EMC and Intel®

Focus: Mobile enterprise
sponsored by ComputerWeekly.com
EGUIDE: Introduction In the last decade or so, mobile devices – mobiles, then smart phones and tablets – have come into companies and organisations to change the ways business applications are put to work.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

ComputerWeekly.com

Chester Zoo: Educating with the Help of Sitecore® Mobile Technology
sponsored by Sitecore
CASE STUDY: Six years ago, a member of Chester Zoo's digital team identified the unstoppable rise of mobile users in analytics reports. Access this case study video and PDF to learn how this pioneering digital team has managed the rapid growth of user mobility before, during, and after every zoo visit.
Posted: 18 May 2016 | Published: 18 May 2016

Sitecore

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: See how CIOs have zeroed-in the threat to mobile security and how they shut down attempts at breaching their networks. Read on to ensure mobility doesn't become a liability to your organization and learn how pros fend off today's data breaches.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

Level-Up Your Enterprise Linux: An Instructional E-Book
sponsored by IBM
EBOOK: In this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.
Posted: 23 Feb 2016 | Published: 23 Feb 2016

IBM

Enterprise Mobile Management: The 11 Providers That Matter Most
sponsored by MobileIron
RESEARCH CONTENT: In this resource, Forrester Research evaluates the 11 most significant EMM vendors from 2015 and provides an analysis to help I&O professionals select the right partner for their EMM. Read on to determine why today's EMM provides a model for future unified application and device management and drives secure productivity.
Posted: 08 Feb 2016 | Published: 04 Dec 2015

MobileIron

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

Get Connected: Building your Digital Workplace
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: This report surveyed 182 organizations on how their employees are adopting IoT, and how it is (or isn't) fitting into their digital transformation initiatives.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

Hewlett Packard Enterprise

The SDN Charge and the New Role in Mobile Security
sponsored by Juniper Networks, Inc.
EGUIDE: Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.
Posted: 14 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Improve Mobile Infrastructure with an Analytics Workshop
sponsored by IBM
WHITE PAPER: Proprietary analytics tools can help identify and clarify your mobile challenges. Uncover a workshop designed to put mobile business in motion with four steps, including data collection, analysis, and more.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

IBM

Making the Financial Case for Hosted VoIP
sponsored by Avaya CenturyLink
RESOURCE: Discover in this post how to evaluate the costs of maintaining your legacy phone service—in terms of CapEx and OpEx—and estimate the financial impact of hosted VoIP to determine if you should adopt. Additionally, access a hosted VoIP TCO tool to build your implementation business case.
Posted: 07 Jul 2016 | Published: 05 Apr 2016

Avaya CenturyLink

Don't Run A 21st Century Business With 20th Century Phones
sponsored by Avaya CenturyLink
RESOURCE: Explore the top 5 business benefits you will receive by making the switch to VoIP from PBX—fulfilling the need for higher performance standards, simpler network operations, and seamless incorporation of new communications apps. Read on to see why you should consider VoIP.
Posted: 07 Jul 2016 | Published: 22 Apr 2016

Avaya CenturyLink

A Guide to Patient Interaction
sponsored by Avaya TSG
WHITE PAPER: Discover how to enhance the patient experience by automating routine processes and expanding patient interaction outside the hospital. Access now and learn the benefits of proactive outreach, both pretreatment and post-discharge, including fewer preventable readmissions, reduced costs, and more.
Posted: 06 Jul 2016 | Published: 31 Dec 2015

Avaya TSG

The Digital Roadmap Demands a New Kind of ITSM Support
sponsored by ServiceNow
EGUIDE: The IT service management (ITSM) times truly are a' changing, and traditional ITSM tactics just don't cut it in today's digitally disrupted marketplace. Discover in this expert guide how to boost IT service delivery in today's digitally enabled marketplace, see how SABRE technology redefines ITSM support.
Posted: 22 Jun 2016 | Published: 20 Jun 2016

ServiceNow

How Cloud Computing Changes the Role of IT
sponsored by MASERGY
RESOURCE: Optimize the performance of your SaaS-based apps by examining network traffic to determine how much of your bandwidth they consume. Discover how to work with end users to improve their cloud-based app experience, and ensure your network is in top shape to accommodate all workloads.
Posted: 25 May 2016 | Published: 15 Jan 2015

MASERGY

Seamless Communications and Collaboration for the Connected Mobile Enterprise
sponsored by Mitel Networks Limited
WHITE PAPER: From this white paper, discover how you can achieve seamless, real-time mobile collaboration in your enterprise. Read on to learn how to leverage existing business apps, embedded real-time communications, and collaboration to boost the agility of your connected mobile enterprise.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

Mitel Networks Limited

Linux Goes Mobile: How LinuxONE can Empower Enterprise Mobility
sponsored by IBM
PRODUCT OVERVIEW: In this resource, you will discover how to deliver an exceptional mobile experience with a scalable Linux platform, and utilize this open source software to leverage agile development and delivery of mobile apps. Read on to also learn to deliver on a highly responsive infrastructure that scales to meet peaks in mobile workloads.
Posted: 25 Feb 2016 | Published: 31 Aug 2015

IBM

Modern Mobility E-zine: February 2016
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

SearchMobileComputing

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

Modern Mobility E-zine – January
sponsored by SearchMobileComputing
EZINE: Discover why many IT departments continue to struggle with compliance in the mobile era and what tools are available to help admins get a better grasp on best practices. Access this e-zine to also get an exclusive, in-depth look at how to ease into EMM in the modern era.
Posted: 13 Jan 2016 | Published: 08 Jan 2016

SearchMobileComputing
1 - 25 of 225 Matches Previous Page    1 2 3 4    Next Page
 
MOBILE IP DEFINITION (continued): … An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than their home network.Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement