Smartphone OS News
July 20, 2017
All future Chromebook releases will support Android apps, which brings concerns regarding their security, management and overall usefulness as thin clients.
June 16, 2017
Apple opens up its Device Enrollment Program by supporting devices that weren't bought from Apple or channel partners. Still, IT isn't content with the EMM capabilities available for those devices.
May 12, 2017
Xamarin Live Player will allow developers to write and test iOS mobile apps more quickly, without requiring a Mac on hand to debug the application.
May 11, 2017
Google implemented clickjacking attack mitigations in Android but left a potential avenue for malicious actors that won't be fixed until Android O is released.
Smartphone OS Get Started
Bring yourself up to speed with our introductory content
VMware Horizon View 7.0.1 and 7.0.2 brings flexibility to the features that were released in the original version earlier this season. Continue Reading
Workers around the world found themselves following Pokémon Go characters into the lunchroom and around their office parks this year. It won't be the last time we see augmented reality technology in the workplace. Manufacturing companies can use augmented reality technology to let workers view blueprints hands-free, for instance, and AR can help others gain powerful insight into how users interact with certain apps. This issue's cover story delves into business uses for AR.
Plus, learn how developers must take browser capabilities into consideration when creating web apps. In this month's Deep Dive, get to know the ins and outs of identity and access management as a service -- a technology that's becoming more critical as users are more tied to their profiles than ever. And in a Q&A with the inventor of the term COPE, learn why businesses should consider the corporate-owned, personally-enabled device model. One such device companies may be adopting is Apple's latest, the iPhone 7, featured in this month's Device Spotlight. Finally, editors look back at the big end-user computing trends of 2016 and peek at what's to come in 2017.Continue Reading
Once developers know what type of mobile apps they need to build, they can focus on finding the right MBaaS or application refactoring tools to streamline their efforts. Continue Reading
Evaluate Smartphone OS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Mobile app users want a consistent experience for all apps -- on all devices. AWS Device Farm tests application features but doesn't give dev teams a full picture of performance. Continue Reading
The latest versions of both Android and iOS up the security ante with encryption and other features. It's up to IT which devices to support, whether Apple or Google. Continue Reading
From handheld devices to server-based data, development of end-to-end mobile computing experiences, applications and services is fast and secure with MBaaS or BaaS. Continue Reading
Manage Smartphone OS
Learn to apply best practices and optimize your operations.
As business desktop applications transition into mobile apps, more iPhone users are accessing professional data. IT must put iOS 10 security as a priority for business. Continue Reading
Bell and Howell's implementation of Kinvey is a winner in the Modern Mobility Innovation Awards. The company needed strong integration with its SAP database to deliver a mobile app to service technicians. Continue Reading
Alternative mobile operating systems to Android and iOS have tried but failed to unseat the key players. Does a new mobile OS even stand a chance in the enterprise? Continue Reading
Problem Solve Smartphone OS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A researcher discovered 76 iOS apps containing sensitive user data that were vulnerable to man-in-the-middle attacks. Expert Michael Cobb explains how developers can prevent this. Continue Reading
A boot mode vulnerability allowed attackers to eavesdrop on calls made on certain Android devices. Expert Judith Myerson explains how the complex exploit works. Continue Reading
A password-verification flaw in iOS 10 allowed attackers to decrypt local backups. Expert Michael Cobb explains how removing certain security checks led to this vulnerability. Continue Reading