Inpixon Blog


A Connected World

3 minute read |
July 30, 2013
Recently, Microsoft launched “Lab of Things” – a cloud-based framework that links to the company’s HomeOS, which monitors and controls connected devices inside home...

How to Thwart the 1% that is Your Enemy

3 minute read |
June 13, 2013
100% growth seems unusual when discussing tech advancements but it’s now the global norm. In fact, we are expected to have two billion active smartphones and tablets next...

Location, location, location

3 minute read |
May 2, 2013
Location was the basis for mobility. The first reason we created mobile phones was so we could be located anywhere and actively communicate. Then we wanted GPS on our...

The Nuts and Bolts of Wireless Security

4 minute read |
February 6, 2013
It’s no secret, wireless technologies have become the de facto network access method for many enterprise users with smartphones and tablets leading the way as the tools of...

This Message Will Self-Destruct in 3…2…

2 minute read |
January 30, 2013
What started as a sexting phenomenon has now made its way into the enterprise security world.

Warning: Data Overload

3 minute read |
January 15, 2013
Although I wasn’t at CES last week, I believe I can experience the show without the hassle of airfare and hotels. There are lists-a-plenty of the Top 10 Best, Top 10...

International Prison Scandals: Inmates Using Contraband Cell Phones

5 minute read |
August 29, 2012
INDIANAPOLIS (AP) — A drug ring that two Indiana inmates allegedly ran behind bars using cellphones to orchestrate drug purchases and sales shows the risks posed by the...

The Importance of Knowing Your Wireless Environment

3 minute read |
January 24, 2012
“After a security breach at the United States Chamber of Commerce last year, the Chamber discovered that its office printer, and even a thermostat in a Chamber-owned...

Mobile Risk Management: A Gap Analysis and A Paper

2 minute read |
August 9, 2011
  According to the SAIC/McAfee study, there will be 1.8 billion smartphones by 2013.  According to Trusteer, 1 in 20 mobile devices will be compromised by 2012.  That...

The Physics of Wireless Security and Honor Codes

3 minute read |
August 8, 2011
  Robust security practices nearly always require a physical mechanism which monitors the zone or system being protected and physically verifies the presence or absence of...

Remote Access and Mobile Device Security Policies: Best Practices

4 minute read |
June 14, 2011
Updated September 10, 2020: This post was originally published on June 14, 2011, and has been updated to reflect technology and industry changes. As our network security...

Situational Awareness

6 minute read |
April 25, 2011
When Guglielmo Marconi first demonstrated wireless telegraphy in 1896, he probably did not foresee an era when the telephone would be wireless and subsequently utilized to...


Advice, stories, and expertise about work life today.



We know your inbox is protected space, so we promise to send only the good stuff, twice a month.