O'Reilly logo

Securing the Borderless Network: Security for the Web 2.0 World by Tom Gillis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Watson, Can You Hear Us?

This chapter includes the following topics:

Human Need for Connectedness

Cutting the Cord

One Chip Makes You Smaller

Handheld Harvest: Apples to BlackBerrys

These Unprecedented Times

Evolution of the Smartphone

Unquestionably, organizations and individuals are achieving far greater levels of productivity and efficiency—and often, significant cost savings—than ever before through the use of Web 2.0 technology. But increasingly sophisticated communication and business tools such as online meeting applications, telepresence, social media, cloud computing, and Software-as-a-Service (SaaS) are only part of what’s driving this trend: Mobile devices, such as smartphones, are placing the power of Web ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required