Standards  >   Network Protocols  >   TCP/IP  >   IP  >  

Mobile IP

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Wireless Internet Protocol, Wireless IP, Mobile Internet Protocol
DEFINITION: An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than  … 
Definition continues below.
Mobile IPReports
126 - 150 of 255 Matches Previous Page  | Next Page
Securing  Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: This informative paper examines the common security issues that diverse mobile platforms can cause and discusses a set of tools designed to help you provide the security that mobile users need without hindering their experience.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

Weaning from BlackBerry - 10 simple steps
sponsored by IBM
WHITE PAPER: This informative resource discusses 10 steps for incorporating a backup plan just in case your vendor falls from grace, using the example of a mobile vendor that was once one of the most popular on the market.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

IBM

How four Citrix customers solved the enterprise mobility challenge
sponsored by Citrix
WHITE PAPER: This exclusive white paper discusses an enterprise mobility management (EMM) solution that provides a simple, secure way to manage mobility throughout the enterprise while meeting user expectations.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Citrix

Critical Capabilities for Mobile Device Management
sponsored by Citrix
WHITE PAPER: This informative resource takes an in-depth look at the top mobile device management (MDM) technologies and examines the effectiveness of their critical capabilities. Read on to find out which MDM solution would fit best into your environment.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Citrix

Enterprise Mobility Adoption and Security Considerations
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide from searchEnterpriseDesktop.com examines the detailed benefits of increased mobility and addresses the key areas to be considered when it comes to mobile security, particularly laptop usage and practices you can follow to avoid security breaches.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SearchSecurity.com

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: This whitepaper examines the major challenges of providing secure access in mobile environments and explores new security models, policies and controls that can help keep critical apps and data secure.
Posted: 24 Feb 2014 | Published: 30 Sep 2013

IBM

Meeting the Mobile Challenge on the Mainframe
sponsored by IBM
WHITE PAPER: This whitepaper examines the effect that mobile or Bring Your Own Devices (BYOD) have on enterprises, and how company mainframe can help support development, management, and security with its processing power.
Posted: 21 Feb 2014 | Published: 17 Oct 2013

IBM

How to Power Workforce Mobility with VDI
sponsored by Citrix
WHITE PAPER: This brief resource reveals how virtualization technology helps meet a wide array of virtualization goals, from enabling BYOD to transforming call centers, and provides a desktop virtualization solution checklist to help you pick your solution.
Posted: 08 Jan 2014 | Published: 08 Jan 2014

Citrix

Next-Generation Knowledge Workers Accelerating the Disruption in Business Mobility
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource discusses how organizations can push the limits of enterprise mobility in order to drive greater innovation and open new streams of revenue, all while dramatically increasing worker satisfaction and productivity.
Posted: 11 Dec 2013 | Published: 11 Dec 2013

Cisco Systems, Inc.

Mobilizing Windows Apps
sponsored by Citrix
WHITE PAPER: This white paper provides best practices for implementing secure remote access to Windows apps and data from any device. Read on now to learn more.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Citrix

Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This whitepaper outlines the top use cases for desktop virtualization and how it can help address the biggest pain points affecting IT today.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

Citrix

Mobility Mayhem: Balancing BYOD with Enterprise Security
sponsored by Code42
PRESENTATION: Join this exclusive webinar now to hear security experts dive deep into how BYOD impacts enterprise security strategies and provide practical tips for securing your mobile workforce.
Posted: 23 Oct 2013 | Published: 11 Dec 2013

Code42

Mobilizing Windows Apps from a Centralized Data Center
sponsored by Citrix
WHITE PAPER: This test report demonstrates the ability to mobilize Windows apps from a central datacenter and deliver them to mobile devices such as tablets.
Posted: 25 Sep 2013 | Published: 25 Sep 2013

Citrix

Overview Of Near Field Communication
sponsored by ComputerWeekly.com
BOOK: This chapter from the book NFC Application Development for Android, offers an overview of NFC for Android developers.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

ComputerWeekly.com

Decode MDM Solution Features: Must haves for security management
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Question #3 featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space if their products support mobile security management features
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

MDM Solutions for Dummies: Product Integration
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Question two featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space: Can your product integrate with enterprise infrastructure elements? Find out what these vendors have to say by accessing their answers to this question now.
Posted: 29 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Mobile Device Management IT Decision Center: Operating Systems
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: SearchSecurity.com’s expert resource asks: Does your product support any OEM extensions (e.g., Samsung SAFE)? Do you require or offer agent applications installed on managed devices? Find out what top vendors have to say by accessing their answers to these questions now.
Posted: 29 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Best Practices for Managing and Understanding Mobile Authentication
sponsored by SearchSecurity.com
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SearchSecurity.com

The 10 “Must-Haves” for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: This informative paper examines the common security issues surrounding BYOD and provides ten helpful "must-haves" for ensuring that your mobile initiatives are safe and secure.
Posted: 27 Feb 2014 | Published: 01 Jun 2014

Citrix

Jack Gold: The Enterprization of Mobile Apps: Moving from Corporate Liability to Business Asset
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines a mobile management strategy that can enable your organization to plan, implement and operate the most cost-effective applications with the greatest degree of security and user productivity. Read on to learn more.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Citrix

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

BYOD is Easy to Manage with VDI
sponsored by Virtual Bridges
WHITE PAPER: This whitepaper explains how virtual desktop infrastructure (VDI) can help mitigate BYOD risks, reduce expenses, extend mobile worker productivity, and more.
Posted: 20 Nov 2013 | Published: 20 Nov 2013

Virtual Bridges

Mobile Unified Communications & Collaboration (UCC) on BlackBerry 10
sponsored by BlackBerry
WEBCAST: This webcast discusses the place of BlackBerry 10 in the move towards real-time enterprise collaboration and how they are working to definitively establish the right balance between personal workspace and the enterprise workspace on mobile desktops.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

BlackBerry

MobilEcho Trial Download
sponsored by Acronis
PRODUCT DEMO: This software demo will help you find out if Acronis mobileEcho is right for your mobile needs.
Posted: 16 Oct 2013 | Premiered: 16 Oct 2013

Acronis
126 - 150 of 255 Matches Previous Page    4 5 6 7 8 9    Next Page
 
MOBILE IP DEFINITION (continued): … An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than their home network.Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement