New & Notable
Get Started
How to exit kiosk mode on any OS
Manually exiting kiosk mode is still necessary in the age of mobile device management for convenience and when it's time to remove kiosks at their end of life.
Get Started
Getting started with kiosk mode for the enterprise
A kiosk can serve several purposes as a dedicated endpoint. Understanding those possibilities and their benefits and challenges is key to deploying kiosk mode for the enterprise.
Problem Solve
How to detect and remove malware from an iPhone
Despite their reputation for security, iPhones are not immune from malware attacks. IT and users should learn the signs of mobile malware and the steps to take when they appear.
Get Started
How to detect and remove malware from an Android device
Mobile malware can come in many forms, but users might not know how to identify it. Understand the signs of malware on mobile devices, as well as what to do to remove the threat.
Trending Topics
-
Mobile Application Strategy Get Started
Does Apple offer work profiles for iPhones?
Apple uses data and device containerization -- instead of the Android Work Profile model -- to split work and personal information on iPhones and support BYOD deployments.
-
Operating Systems & Devices Get Started
How to use the iPadOS file manager in the enterprise
Organizations can use the iPadOS Files app to manage files locally or in the cloud. Learn the pros and cons of both storage types and how to use them in the native file manager.
-
Mobile Security Problem Solve
How to detect and remove malware from an iPhone
Despite their reputation for security, iPhones are not immune from malware attacks. IT and users should learn the signs of mobile malware and the steps to take when they appear.
-
Mobile Infrastructure News
Cisco adds ML to Meraki cameras to track objects
Cisco's MV Sense is available as a subscription with Meraki MV cameras. Companies can use the service to count boxes in a warehouse or track equipment on a factory floor.
-
Mobile Management Manage
How to fix an iPhone Personal Hotspot that's not working
Connectivity issues, misconfigured settings and human error can all cause mobile hotspot problems. IT and users must know how to avoid and fix these issues for remote work.
-
Unified endpoint management Manage
What are the Microsoft 365 password requirements?
When IT administrators manage passwords for Microsoft 365 accounts in Azure AD, they can deploy and remove critical policies that can improve overall security posture.
Find Solutions For Your Project
-
Evaluate
MADP
A mobile application development platform (MADP) is a type of software that allows a business to rapidly build, test and deploy mobile apps for smartphones or tablets.
-
mobile application management (MAM)
-
Does Apple offer work profiles for iPhones?
-
How long should you support Android phones in the enterprise?
-
-
Problem Solve
How to detect and remove malware from an iPhone
Despite their reputation for security, iPhones are not immune from malware attacks. IT and users should learn the signs of mobile malware and the steps to take when they appear.
-
How does enterprise file management in iOS work?
-
How small businesses can pick the right mobile devices
-
Understanding BYOD policy enforcement and creation
-
-
Manage
How to fix an iPhone Personal Hotspot that's not working
Connectivity issues, misconfigured settings and human error can all cause mobile hotspot problems. IT and users must know how to avoid and fix these issues for remote work.
-
How to detect and remove malware from an Android device
-
How to set up kiosk mode for iPad and other OSes
-
How to protect mobile devices from malware in the enterprise
-
Mobile Computing Basics
-
Get Started
Google Firebase
Google Firebase is a set of cloud-based development tools that helps mobile app developers build, deploy and scale their apps.
-
Get Started
remote wipe
Remote wipe is a security feature that allows a network administrator or device owner to send a command that remotely deletes data from a computing device.
-
Get Started
Apple Watch
Apple Watch is a wearable smartwatch that allows users to accomplish a variety of tasks, including making phone calls, sending text messages and reading email.
Multimedia
-
News
View All -
Mobile operating systems and devices
Samsung seeks bigger role as a business mobile provider
Samsung's wide variety of mobile devices, partnerships with software makers and government-grade security are differentiators in the business market, analysts said.
-
Mobile management
Jamf Q&A: How simplified BYOD enrollment helps IT and users
Jamf executives at JNUC 2022 share their vision of the future with simplified BYOD enrollment and the role iPhones have in the enterprise.
-
Mobile security
Jamf to acquire ZecOps to bolster iOS security
Jamf will pay an undisclosed sum for ZecOps, which logs activity on iOS devices to find potential attacks. The companies expect the deal to close by 2023.
Mobile Computing Definitions
- Apple watchOS (Apple Watch operating system)
- mobile workforce management (MWM)
- cross-platform mobile development
- mobile application development platform (MADP)