Advisor

Mobile Mayhem: Identities as the New Perimeter

Posted May 26, 2014 | Leadership | Technology |

Mobile devices and cloud computing continue to redefine basic concepts of IT and challenge the concepts taken for granted over the preceding decades. One of the issues in ferment today is that of defining access and providing secure and differential availability of computing resources to users as needed.

About The Author
Brian Dooley
Brian J. Dooley is an author, analyst, and journalist with more than 30 years' experience in analyzing and writing about IT trends. Mr. Dooley has written seven books, numerous user manuals, hundreds of reports, and more than 2,000 magazine features. He is the founder and past President of the New Zealand Chapter of the Society for Technical Communication and initiated the Graduate Certificate in Technical Communication program at Christchurch… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.