IMS

The ultimate goal of IMS (Internet Protocol Multimedia Subsystem) is to transmit all multimedia and voice through standards derived from common Internet protocols (IP). IMS relies on Session Initiation Protocol (SIP) and is a key underpinning of Voice over Internet Protocol (VoIP) and the range of advanced mobile voice and data services referred to as 3G and 4G. IMS is being implemented in phases by the mobile communications industry, but it is eventually expected to entirely replace the circuited mobile infrastructure.


Articles

Business and IT Leaders Must Think Differently

Digital technology presents incredible challenges and fundamentally changes the nature of products. The first step is recognizing a need to think differently. More >

How Enterprises Can Get Better Access to Real-Time Data

Here's a list of data points around a new approach to enterprise performance management. More >

Cisco CEO: Internet of Everything Will Be Worth $19 Trillion

At CES, John Chambers said the Internet of everything will be more about its impact on people's lives than the underlying technology. More >

More Articles >

Interviews

BYOD, Wireless Drive Network Complexity

The explosion of wireless devices has increased the number of devices workers use at home and at work. Ankur Chadda discusses the implications this has on the enterprise.

More >

Protect Data or Device? The Key Choice in Securing Mobility

Focusing on the device inconveniences users and doesn't work.

More >

Controlling the Mobile Transition

BYOD (bring your own device) is a well-established trend. The next steps are to redesign business processes as mobility takes root and implement a “buy the right device” program.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Nine Questions to Ask When Selecting a Security Vendor

Security Staffing

You need it. They claim to have it. What questions should you be asking as you hunt for the "just right" vendor to help you defend against the most sophisticated and determined adversaries? 

 More >

Money Management Tools Help SMBs Predict Cash Flow

Why Higher Education Is Desperate for McAfee’s Comprehensive Security Approach

Cloud and Disaster Recovery/Business Continuity: A Perfect Fit

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

mobile9 PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud

This excerpt from chapter four focuses on using PhoneGap Build, including beginning steps, creating builds for different m...

Managing the Security of Mobile Devices in the Enterprise

This publication provides recommendations for selecting, implementing, and using centralized management technologies, and ...

Tutorial Building Security into ‘Off-The-Shelf’ Smartphones

This paper from the National Institute of Standards and Technology discusses the key issues surrounding smartphone securit...

BYOC Readiness Assessment Tool BYOC Readiness Assessment Tool

Successful deployment of each BYOC model depends on a different mix of capabilities.

...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.