SearchMobileComputing

New & Notable

Manage

Understanding QR code security issues for enterprise devices

QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep these risks in mind and learn how to avoid them.

Evaluate

How mobile firewalls protect against unique threat vectors

Firewalls are an essential part of network security. As more employees use mobile devices for work, mobile firewalls are an increasingly vital security tool for enterprises.

Get Started

How to perform a full remote wipe on an Android device

When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace.

Manage

How to perform a full remote wipe on an iPhone

A remote wipe is a vital security tool as mobile devices become more common in the workplace. In organizations allowing work data on iPhones, IT should know the iOS wipe options.

Find Solutions For Your Project

Mobile Computing Basics

  • Get Started

    m-commerce (mobile commerce)

    M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.

  • Get Started

    microblogging

    Microblogging is a short blog post designed for quick and typically direct audience interactions.

  • Get Started

    How to perform a full remote wipe on an Android device

    When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across SearchMobileComputing

SearchNetworking
SearchUnifiedCommunications
SearchSecurity
Close