That smart phone or tablet you tote around could be a device for authenticating access to corporate networks. Read how experts think it could work
There are lots of practical uses in the enterprise for smart phones and tablets, including checking email and showing product images to customers.
But their screen sizes and processing power may make them ideal for security authorization through biometrics.
But the concept does raise a number of possibilities
Sponsor: IBM Canada Ltd
The New Workplace: Supporting “Bring your own”
“Bring Your Own Device” (BYOD) and the “consumerization of IT” have taken hold in the enterprise, and employees using their own personal smartphones and tablets for business have become pervasive.