Mobile devices and cloud computing continue to redefine basic concepts of IT and challenge the concepts taken for granted over the preceding decades. One of the issues in ferment today is that of defining access and providing secure and differential availability of computing resources to users as needed.
Advisor
Mobile Mayhem: Identities as the New Perimeter
By Brian Dooley
Posted May 26, 2014 | Leadership | Technology |
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.