outside the vox

over the air customer care + mobile device management + related wireless snippets

Pages

  • home
  • welcome
  • mdm
  • headlines

Trusted Computing Group unveils mobile phone security use cases.

"The organization has created a set of use cases for mobile phone security and intends to have a publicly available specification ready for first half of 2006."
on Monday, October 24, 2005
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Search This Blog

Vox Link

  • Device Management Forum
  • Glossary from CNP
  • Glossary from Phone Scoop
  • InnoPath's MDM FAQ
  • Introduction to Cellular Networks
  • Introduction to FOTA
  • Introduction to OMA Device Mgmt
  • Mobile UI Guidelines
  • Open Mobile Alliance (OMA)
  • Peering Inside a Mobile Network

Vox Labels

  • "blog owner speaks" (3)
  • "content" (6)
  • "enterprise" (130)
  • "innovation" (5)
  • "m2m" (41)
  • amazon (6)
  • apple (148)
  • asurion (3)
  • bigfix (2)
  • bitfone (23)
  • bridgewater (4)
  • ca (4)
  • cisco (2)
  • enterpriseMobile (4)
  • facebook (1)
  • funambol (4)
  • gemalto (3)
  • google (175)
  • hp (20)
  • ibm (10)
  • imate (1)
  • innopath (104)
  • insignia (15)
  • intel/mcafee (9)
  • intellisync (8)
  • internoded (2)
  • juniper/smobile (7)
  • logmein (5)
  • lookout (5)
  • mformation (44)
  • microsoft (81)
  • mobileiron (2)
  • motive (5)
  • motorola (16)
  • nokia (68)
  • norton (1)
  • nuance (5)
  • o3sis (4)
  • qualcomm (7)
  • redbend/virtuallogix (62)
  • rim (21)
  • sicap (8)
  • smarttrust (8)
  • smsi (4)
  • snapin (8)
  • sun (5)
  • sybase/sap (13)
  • symantec (9)
  • synchronica (20)
  • tangoe (2)
  • webroot (1)
  • yahoo (3)
Picture Window theme. Powered by Blogger.