Standards  >   Network Protocols  >   TCP/IP  >   IP  >  

Mobile IP

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Wireless Internet Protocol, Wireless IP, Mobile Internet Protocol
DEFINITION: An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than  … 
Definition continues below.
Mobile IPReports
126 - 150 of 195 Matches Previous Page  | Next Page
Mobile Expense Management
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Rob Bamforth and Clive Longbottom advise businesses on ways to manage the cost of mobile communications.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

ComputerWeekly.com

Getting a better grip on mobile devices
sponsored by IBM
WHITE PAPER: Read this whitepaper and learn how to unlock the business opportunities that BYOD has to offer through proper mobile device management. Get tips on managing mobile applications, implementing management technology, creating a BYOD plan, and more.
Posted: 15 Mar 2013 | Published: 14 Mar 2013

IBM

Security Essentials for CIOs
sponsored by IBM
WHITE PAPER: Read this whitepaper and learn five important steps to consider when embarking on a BYOD program - steps that will make BYOD use a reality by seamlessly securing corporate data and applications on the device while providing a logical separation from personal activities and data.
Posted: 15 Mar 2013 | Published: 14 Mar 2013

IBM

A special issue covering the opportunities in mobility market
sponsored by MicroScope
EZINE: A special issue covering the opportunities for resellers selling mobility hardware, supporting infrastructure and management tools
Posted: 08 Feb 2013 | Published: 11 Feb 2013

MicroScope

Mobile Data Offload and Onload
sponsored by ComputerWeekly.com
ANALYST REPORT: Consumer traffic demand continues to outstrip network planning capacity putting pressure on operator's networks. There are several solutions to this problem says analysts Juniper Research.
Posted: 12 Oct 2012 | Published: 12 Oct 2012

ComputerWeekly.com

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
sponsored by Insight
WHITE PAPER: Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
Posted: 13 May 2013 | Published: 13 May 2013

Insight

Implementing Your BYOD Mobility Strategy: AN IT Checklist and Guide
sponsored by Insight
WHITE PAPER: This mobility checklist will offer readers an easy-to-read breakdown of what the IT department absolutely needs to consider when implementing a BYOD program into their enterprise. Read on to learn about the applications to choose, the installation and configuration options available, how to evaluate device performance, and more.
Posted: 10 May 2013 | Published: 21 Feb 2012

Insight

Choose Your Own Device (CYOD) Workshop
sponsored by Insight
WHITE PAPER: Read on to learn about a CYOD workshop that can help you understand and develop a winning CYOD strategy with help from industry experts. Find out how taking advantage of this valuable learning experience will help you get a good grasp on policies and compliance, device lifecycles, device management, and more.
Posted: 10 May 2013 | Published: 31 Mar 2013

Insight

Mobility: BYOD vs. CYOD
sponsored by Insight
WHITE PAPER: Whether you choose to implement a bring-your-own-device (BYOD) or a choose-your-own-device (CYOD) policy, IT still needs to meet the mobility challenge with an integrated solution. This white paper will help you learn about a holistic approach to managing the mobile technologies in your network, no matter how you choose to deploy them.
Posted: 10 May 2013 | Published: 28 Feb 2013

Insight

A holistic approach to your BYOD challenge
sponsored by Insight
WHITE PAPER: Ensuring security of business applications on personal devices and maintaining unified wired and wireless visibility and management is key for BYOD. This white paper discusses the most critical requirements for effective BYOD management and offers advice on how IT can successfully manage this trend.
Posted: 10 May 2013 | Published: 10 May 2013

Insight

Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You
sponsored by Insight
WHITE PAPER: Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more.
Posted: 06 May 2013 | Published: 06 May 2013

Insight

Mobile Security: Email is Your Biggest Risk
sponsored by TITUS
WHITE PAPER: In this white paper, you'll learn why proactive, purpose based mobile security solutions that focus on keeping e-mail secure are essential for your organization, and discover how you can start improving your own security posture today.
Posted: 02 May 2013 | Published: 31 Dec 2012

TITUS

Solving the Challenges of BYOD
sponsored by SearchConsumerization.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013


Aruba’s MultiUse Video
sponsored by Aruba Networks
VIDEO: Why continue managing devices, when you can manage the applications? This video will teach you about enterprise mobile management, and how you can make enterprise mobility a lot simpler. Dive in to learn more.
Posted: 30 Apr 2013 | Premiered: 29 Mar 2013

Aruba Networks

PCI Council issues mobile application rules for software developers
sponsored by Hewlett-Packard Company
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Hewlett-Packard Company

The New World of Mobility Management
sponsored by Aruba Networks
WHITE PAPER: This resource offers key information IT professionals can use to set their plans for mobility on the right track. Read on to discover the 3 phases to mobilizing a business, the functions of Enterprise Mobility Management, and a Mobile Management needs checklist.
Posted: 23 Apr 2013 | Published: 31 Mar 2013

Aruba Networks

Discover the Risks and Rewards Behind a Mobile Workforce
sponsored by More Direct
EGUIDE: Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

More Direct

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

iPad in Business: iOS Deployment
sponsored by Apple Inc.
WEBCAST: In this two-part online seminar, you'll learn about deploying iPhone and iPad in business environments. Learn different approaches to deployment, configuration and management options, device management solutions and app deployment.
Posted: 12 Apr 2013 | Premiered: Apr 25, 2013

Apple Inc.

Mobile Device Management Systems Help Mitigate BYOD Risks
sponsored by Citrix Systems, Inc.
EGUIDE: This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Mobile EndPoint Security and Management - Best Practices
sponsored by Dell, Inc.
EGUIDE: Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

Dell, Inc.

Six Ways to Embrace IT Consumerization
sponsored by Webroot
EGUIDE: Here are six ways your organization can embrace consumerization. Get some helpful tips for working with end-users, focusing IT's role, avoiding "crapplications", and more.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

Webroot

Choosing an MDM System: Fundamental Features for Success
sponsored by Webroot
EGUIDE: There's a huge number of mobile device management (MDM) functions that exist today. Read this expert E-Guide to get a condensed list of the major MDM system features that most organizations require.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

Webroot
126 - 150 of 195 Matches Previous Page    4 5 6 7 8    Next Page
 
MOBILE IP DEFINITION (continued): … An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than their home network.Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement