REGISTER | LOGIN
Breaking News
Comment
BrianBailey
User Rank
Author
Re: Part II: Four Pillars of Intelligent Industrial Apps: Security, Manageability, Connectivity & Performance
BrianBailey   11/27/2012 12:51:50 PM
NO RATINGS
Cell phones are authenticated - yes. To ensure they belong on that network. But how do YOU ensure that this is a person you want to extract data from your phone? With a call, you filter based on caller-id, which can be manipulated.



Like Us on Facebook