Standards  >   Network Protocols  >   TCP/IP  >   IP  >  

Mobile IP

RSS Feed   
ALSO CALLED: Wireless Internet Protocol, Wireless IP, Mobile Internet Protocol
DEFINITION: An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than  … 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Mobile IP Reports
1 - 25 of 171 Matches Previous Page  |  Next Page
Advanced Secure Access for Remote and Mobile Workers
sponsored by Barracuda Networks
PRODUCT OVERVIEW: Download this resource to discover how to provide your mobile workers with secure, flexible, remote access to corporate apps and information, and reduce the risks of BYOD, with a cloud-based firewall.
Posted: 21 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Focus: Mobile enterprise
sponsored by ComputerWeekly.com
EGUIDE: Introduction In the last decade or so, mobile devices – mobiles, then smart phones and tablets – have come into companies and organisations to change the ways business applications are put to work.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

ComputerWeekly.com

Level-Up Your Enterprise Linux: An Instructional E-Book
sponsored by IBM
EBOOK: In this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.
Posted: 23 Feb 2016 | Published: 23 Feb 2016

IBM

TCO and the Cloud: Calculating The Benefits and Risks
sponsored by 8x8, Inc.
WHITE PAPER: This white paper debunks the myth that cloud is more expensive than traditional premise-based systems, and explains that TCO studies fail to value key strengths of cloud-delivered services. Learn how to compare costs with the extent of cloud benefits in mind.
Posted: 24 Nov 2015 | Published: 31 Oct 2015

8x8, Inc.

Mobile Consumer 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Britain's mobile phone owners look at their devices nearly 1.1 billion times a day, the equivalent of 400 billion times a year, according to research from Deloitte.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

ComputerWeekly.com

The lost opportunity – assessing the impact of OTT services
sponsored by ComputerWeekly.com
ANALYST REPORT: In this special report for Computer Weekly readers, Juniper Research looks at the challenges and opportunities facing mobile operator business models.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

ComputerWeekly.com

Security issues in Vanets
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of intelligent transportation systems.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

ComputerWeekly.com

Devices-as-a-Service Potential Set to Expand for Channel Partners and Organizations
sponsored by CompuCom Systems, Inc.
EGUIDE: This expert guide serves as your window into the DaaS market—deconstructing the DaaS growth forecast, how to become a DaaS provider should you choose to do so, and how your company can make the most of mobile services. Read on for the details.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

CompuCom Systems, Inc.

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

Augmented Reality Mobile Technology Still 'Experimental' in the Enterprise
sponsored by Dell EMC and Intel®
EGUIDE: Pokémon Go brought augmented reality (AR) technology to the masses. In this guide, our experts illustrate the basics of AR in the mobile enterprise, and how to overcome adoption roadblocks such as cost, lack of development tools, and more. Read on to dive into the state of the AR market and evaluate its adoption readiness in your enterprise.
Posted: 06 Apr 2017 | Published: 03 Apr 2017

Dell EMC and Intel®

The SDN Charge and the New Role in Mobile Security
sponsored by Juniper Networks, Inc.
EGUIDE: Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.
Posted: 14 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Modern Mobility E-zine: February 2016
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

SearchMobileComputing

Modern Mobility E-zine – January
sponsored by SearchMobileComputing
EZINE: Discover why many IT departments continue to struggle with compliance in the mobile era and what tools are available to help admins get a better grasp on best practices. Access this e-zine to also get an exclusive, in-depth look at how to ease into EMM in the modern era.
Posted: 13 Jan 2016 | Published: 08 Jan 2016

SearchMobileComputing

Modern Mobility E-zine: In-App Analytics Get Down to Business
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, delve straight into in-app analytics, and learn how the insights this technology provides will keep mobile applications on track. Access this exclusive e-zine now to learn more about mobile backend as a service, and how to build apps that connect to data center infrastructure.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

SearchMobileComputing

Computer Weekly – 21 July 2015: How the internet of things could save the honeybee
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with bee populations being decimated, we find out how the internet of things could save the honeybee. Amid fears that artificial intelligence could end human innovation, we hear from the experts on AI about the reality. And we examine the challenges of customer service in a multi-channel world. Read the issue now.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

ComputerWeekly.com

There's an App Store for That: Stock Your Mobile Workers with the Right Resources
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will discover how to develop, provision, and manage mobile apps through an individualized enterprise app store built on a secure portal. Access this e-zine now to learn how deploying your own app store cuts down on the problems that arise with public stores.
Posted: 08 May 2015 | Published: 08 May 2015

SearchMobileComputing

An Exclusive Guide for Promoting Enterprise Mobility Management
sponsored by SearchMobileComputing
EBOOK: This e-book takes readers through the process of enabling and managing a secure mobile workforce. Access this resource to understand how mobility can increase agility—and why security concerns, while important, shouldn't stop mobility in your organization from taking off.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchMobileComputing

Shifting Unified Communications into the Cloud and Mobile Apps
sponsored by SearchUnifiedCommunications.com
EBOOK: This Technical Guide explores the disconnect between UC applications and how employees in sales, marketing, customer service and other departments do their job. It also discusses how vendors are working to integrate UC capabilities in popular work software, like customer-management applications, on both desktop and mobile devices.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

SearchUnifiedCommunications.com

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by Commvault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

Commvault

CIO Spotlight: Controlling Data Risk In the BYOD Onslaught
sponsored by Commvault
WHITE PAPER: This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Commvault

Balancing wireless LAN troubleshooting strategies for BYOD
sponsored by Extreme Networks
EGUIDE: This expert E-Guide highlights the variety of tools available for proactive and responsive BYOD troubleshooting.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Extreme Networks

What VMware Horizon 6 can offer you
sponsored by VMware, Inc.
WHITE PAPER: This resource walks through the major trends impacting employee work styles, how the role of IT is changing to adapt, and a desktop virtualization strategy that can help support and optimize mobile capabilities.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VMware, Inc.

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

Gartner Report: Best Practices in Choosing and Implementing EMM
sponsored by Citrix
ANALYST REPORT: Many organizations are process of selecting or planning the implementation of a mobile device management solution. Get best practices and a step-by-step approach for mobile and security specialists.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Citrix
1 - 25 of 171 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement