Standards  >   Network Protocols  >   TCP/IP  >   IP  >  

Mobile IP

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Wireless Internet Protocol, Wireless IP, Mobile Internet Protocol
DEFINITION: An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than  … 
Definition continues below.
Mobile IP Reports
26 - 50 of 282 Matches Previous Page  |  Next Page
BYOD or COPE - Which enterprise mobility strategy is right for you?
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: This e-guide highlights comparison points for the two models, including control,privacy, productivity, and more. Learn which model would be the best fit for your organization.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Dell, Inc. and IntelĀ®

Move Forward with BYOD Security
sponsored by BitGlass
WHITE PAPER: This exclusive resource explains why mobility and BYOD can be held back by sub-optimal security strategies, and offers one that was able to deliver rock-solid security without affecting end-user privacy. Read on to learn more.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

BitGlass

PCI Data Security Compliance & BYOD
sponsored by BitGlass
WHITE PAPER: This exclusive security report takes an in-depth look at BYOD and mobile compliance, offering a strategy that was able to deliver both IT's and end-user's expectations. Read on to learn more.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

BYOD Security: Free Your Employees and Secure Your Data
sponsored by BitGlass
WHITE PAPER: This exclusive security report takes an in-depth look at BYOD and mobile security, offering a strategy that was able to deliver both IT's and end-user's expectations. Read on to learn more.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

Simplifying the Management of Macs and Mobile Devices
sponsored by Centrify Corporation
WHITE PAPER: This exclusive whitepaper takes an in-depth look at simplifying the management of Macs and mobile devices. Read on to learn more and take the first step towards improved mobile device management.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Centrify Corporation

Embracing BYOD with Mobile Device Management
sponsored by IBM
WEBCAST: This exclusive webcast takes an in-depth look at how organizations are embracing BYOD corporate philosophy and how dynamic mobile device management can take your strategy to the next level. View now to learn more.
Posted: 30 Jan 2015 | Premiered: Jan 30, 2015

IBM

Enterprise Mobility Management: The Big Bang Theory
sponsored by IBM
WHITE PAPER: This exclusive white paper takes and in-depth look at how enterprise mobility is expanding, and why device management will become key for organizations. Read on to learn more.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

IBM

Endpoint Data Protection: A Buyer's Checklist
sponsored by CommVault
WHITE PAPER: This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

CommVault

Enterprise Mobility-as-a-Service
sponsored by Dimension Data
PRODUCT OVERVIEW: This exclusive white paper dives into Enterprise Mobility-as-a-Service (EMaaS) and explains the benefits that come along with this new option. Read on to learn more.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Dimension Data

Evolve Your UC Strategy with the Cloud
sponsored by Dimension Data
PRODUCT OVERVIEW: This exclusive white paper offers an in-depth look at the always-changing UC & C market and explains why UCC is something every organization should consider. Read on to learn more.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Dimension Data

How Mobile Security Is Shifting From Device To Data, Apps
sponsored by CommVault
WHITE PAPER: In this e-guide, learn why enterprise mobile security is no longer as simple as protecting an employee's device, and how CommVault is shifting with the industry and providing backup to people other than storage admins. Read on to learn more.
Posted: 08 Jan 2015 | Published: 08 Jan 2015

CommVault

Eguide: Cloud-Based Unified Communications Essential to Mobility
sponsored by Dimension Data
EGUIDE: In this eguide, Nemertes Research analyst Philip Clarke discusses why enterprises should look to the cloud and how it can benefit their mobile UC strategy. Read on to learn more.
Posted: 08 Jan 2015 | Published: 08 Jan 2015

Dimension Data

Optimizing the Datacenter Network for Improved Scalability, Orchestration, and Automation
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at the four pillars of computing, and how they all blend together to drive innovation and optimization in the network today. Read on to learn more.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

Cisco Systems, Inc.

The Drive For Efficiency In Branch Office IT
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how a cloud-optimized solution emerged as a true contender in branch office IT support. Read on to learn more.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Citrix

Jump Start Mobile Productivity with MDM and Secure File Sharing
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at the importance of a solid MDM strategy, and how your organization reap the benefits of mobility with such. Read on to learn more.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Citrix

Gartner Best Practices in Choosing, Implementing and Using MDM and EMM
sponsored by Citrix
WHITE PAPER: This exclusive resource from Gartner Research provides an in-depth look at best practices for implementing mobile device management (MDM) and enterprise mobility management (EMM) strategies. Read on to learn more.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Citrix

Enterprise Mobility Management at Your Own Pace: A Three-Phase Approach
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how mobility has empowered organizations across the spectrum for many industries. Also, learn why BYOD is the go-to strategy for most mobile organizations. Read on to discover more.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Citrix

Get the Most from Your EMM Deployment with Secure File Sharing
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how safe file delivery and access to mission critical data becomes key security issue for mobile devices. Read on to learn more.
Posted: 30 Dec 2014 | Published: 30 Dec 2014

Citrix

The Forrester Wave: Enterprise Mobile Management, Q3 2014
sponsored by Citrix
WHITE PAPER: This exclusive resource compares the top vendors of EMM today and provides key takeaways for each one. Read on to learn more and take the first step towards better mobile management.
Posted: 30 Dec 2014 | Published: 30 Dec 2014

Citrix

Drive Business Growth with Mobile Workspaces
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in depth look at how to drive business growth and continuity through mobile workspaces. Read on to learn more.
Posted: 30 Dec 2014 | Published: 30 Dec 2014

Citrix

Addressing IT Data Challenges in Today's Mobile World
sponsored by CommVault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

CommVault

Gartner Magic Quadrant for Enterprise File Synchronization and Sharing
sponsored by Citrix
WHITE PAPER: This exclusive vendor comparison compares mobile security vendors and takes an in-depth look at each one, helping you make sure to choose the right strategy for your business. Read on to learn more
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Citrix

Evaluating Secure File Sharing with Enterprise Mobility Management
sponsored by Citrix
VIDEO: This Gartner webcast discusses why EFSS is a critical component of your strategy to protect enterprise data, and how to integrate EFSS with other enterprise mobility management (EMM) components.
Posted: 29 Dec 2014 | Premiered: 29 Dec 2014

Citrix

Delivering Enterprise Information Securely on Android, Apple iOS and Microsoft Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how IT security has changed with the introduction of consumerization and BYOD in the enterprise. Read on to learn more.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Citrix

CIO How-To Kit: Bring-Your-Own Devices
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how a custom-fit BYOD strategy for your company can help you realize the full benefits of mobility. Read on to learn more.
Posted: 26 Dec 2014 | Published: 26 Dec 2014

Citrix
26 - 50 of 282 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE IP DEFINITION (continued): … An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than their home network.Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement