Smartphone OS News
November 03, 2017
Security researchers competing at Mobile Pwn2Own 2017 used multiple vulnerabilities to hack iOS 11 in order to execute code and win prizes.
October 25, 2017
The Apple Device Enrollment Program is well-established, and now, Microsoft and Google have their own zero-touch device provisioning services for Android and Windows.
October 23, 2017
Macs are gradually making their way into traditional organizations, so IT professionals are now looking for improved Mac management capabilities.
September 29, 2017
Google's Project Zero released a proof-of-concept iOS exploit similar to the Broadpwn Wi-Fi flaw that could allow an attacker to run code or implant a backdoor.
Smartphone OS Get Started
Bring yourself up to speed with our introductory content
Apple iOS 11's support of NFC tags combined with the explosion of IoT devices means that IoT and NFC applications are soon to take off. Continue Reading
VMware Horizon View 7.0.1 and 7.0.2 brings flexibility to the features that were released in the original version earlier this season. Continue Reading
Workers around the world found themselves following Pokémon Go characters into the lunchroom and around their office parks this year. It won't be the last time we see augmented reality technology in the workplace. Manufacturing companies can use augmented reality technology to let workers view blueprints hands-free, for instance, and AR can help others gain powerful insight into how users interact with certain apps. This issue's cover story delves into business uses for AR.
Plus, learn how developers must take browser capabilities into consideration when creating web apps. In this month's Deep Dive, get to know the ins and outs of identity and access management as a service -- a technology that's becoming more critical as users are more tied to their profiles than ever. And in a Q&A with the inventor of the term COPE, learn why businesses should consider the corporate-owned, personally-enabled device model. One such device companies may be adopting is Apple's latest, the iPhone 7, featured in this month's Device Spotlight. Finally, editors look back at the big end-user computing trends of 2016 and peek at what's to come in 2017.Continue Reading
Evaluate Smartphone OS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
There are plenty of Microsoft Office alternatives to help organizations keep up with the pace of business if they want a change from the typical enterprise software. Continue Reading
Although Android and iOS rule mobile OSes, within these OSes are multiple versions. Because of this, when developing for mobile platforms, you face a choice: native apps or MBaaS APIs. Continue Reading
Building enterprise mobile apps from scratch is becoming more complex. To lessen the challenges, companies are turning to mobile-backend-as-a-service platforms. Continue Reading
Manage Smartphone OS
Learn to apply best practices and optimize your operations.
Cross-platform malware enables attackers to leverage their attacks using infected Microsoft Word docs. Expert Nick Lewis explains how the attacks work and how to defend against them. Continue Reading
As business desktop applications transition into mobile apps, more iPhone users are accessing professional data. IT must put iOS 10 security as a priority for business. Continue Reading
Bell and Howell's implementation of Kinvey is a winner in the Modern Mobility Innovation Awards. The company needed strong integration with its SAP database to deliver a mobile app to service technicians. Continue Reading
Problem Solve Smartphone OS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
To avoid a mobile device catastrophe, several large tech organizations came together to stop the WireX botnet. Learn how this Android botnet with 300 infected apps was stopped. Continue Reading
Welcome to the dawn of conversational computing. A big part of this week's Google-HTC deal is about building smartphones -- and other AI-powered devices -- that talk to us. Also: Facebook turns over Russian-linked ads. Continue Reading
A verification flaw in the synchronization service of iCloud Keychain enables attackers to intercept the data it transfers. Expert Frank Siemons explains what to do about it. Continue Reading