Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
How to create a mobile device management policy for your org
A mobile device management policy creates several essential benefits for an organization, like security measures and data and application guidelines for corporate information. Continue Reading
Apple AirDrop
Apple AirDrop is a native feature in iOS and macOS that lets users share data from one device to another on the same Wi-Fi network. Continue Reading
Apple Bonjour
Apple Bonjour is a group of networking technologies designed to help devices and applications discover each other on the same network. Continue Reading
-
captive portal
A captive portal is a webpage that the user of a public-access network is required to view and interact with before they can access the network. Continue Reading
bluesnarfing
Bluesnarfing is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection. Continue Reading
How to use the iPadOS file manager in the enterprise
Organizations can use the iPadOS Files app to manage files locally or in the cloud. Learn the pros and cons of both storage types and how to use them in the native file manager.Continue Reading
wireless distribution system (WDS)
A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN) without requiring that they connect through a wired backbone.Continue Reading
wireless broadband (WiBB)
Wireless broadband (WiBB) is high-speed internet and data service delivered through a wireless local area network (WLAN) or wireless wide area network (WWAN).Continue Reading
service set identifier (SSID)
A service set identifier (SSID) is a sequence of characters that uniquely names a Wi-Fi network.Continue Reading
LTE (Long-Term Evolution)
LTE (Long-Term Evolution) is a fourth-generation (4G) wireless standard that provides increased network capacity and speed for cellphones and other cellular devices compared with third-generation (3G) technology.Continue Reading
-
802.11n
802.11n is an IEEE standard for wireless networking that boosts the speed, dependability and range of wireless transmissions in wireless local area networks (WLANs).Continue Reading
What are the best file managers for Mac devices?
If the native macOS file manager is lacking, IT can look to third-party options for advanced features. Commander One, ForkLift and Path Finder are three alternatives to consider.Continue Reading
mobile operating system
A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.Continue Reading
mobile device management (MDM)
Mobile device management (MDM) software allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.Continue Reading
How to ensure iPhone configuration profiles are safe
Configuration profiles make it easier to manage BYOD iPhones, but they're also associated with malware. Mobile security policies can ensure configuration profiles are safe.Continue Reading
laptop
A laptop, sometimes called a notebook computer by manufacturers, is a battery- or AC-powered personal computer (PC) smaller than a briefcase.Continue Reading
antenna
An antenna is a specialized transducer that converts electric current into electromagnetic (EM) waves or vice versa.Continue Reading
Apple iOS
Apple iOS is a proprietary mobile operating system that runs on mobile devices such as the iPhone and iPad.Continue Reading
instant app (Google Android instant app)
A Google Android instant app is a small software program that enables users to test out a portion of a native Android app without installing it on a device.Continue Reading
Android Oreo
Android 8.0 Oreo is the eighth major update to the Android operating system that contains new features and enhancements for application developers.Continue Reading
How to remove a management profile from an iPhone
User Enrollment creates a management profile for BYOD iPhones, but IT must remove that data in cases such as device loss or theft. Learn how to do this with a selective wipe.Continue Reading
Android OS
Android OS is a Linux-based mobile operating system that primarily runs on smartphones and tablets.Continue Reading
mobile malware
Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches.Continue Reading
mobile application management (MAM)
Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.Continue Reading
How to restore a deleted Android work profile
If a user deletes an Android work profile or switches devices, they will need to go through the process to restore it. Learn the simple steps to reenroll an Android work profile here.Continue Reading
Does Apple offer work profiles for iPhones?
Apple uses data and device containerization -- instead of the Android Work Profile model -- to split work and personal information on iPhones and support BYOD deployments.Continue Reading
How to delete or disable an Android work profile
When users leave an organization or lose a device, it's time to remove their Android work profile. Learn three methods to get rid of a work profile on a BYOD device.Continue Reading
Siri
Siri is Apple's virtual assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).Continue Reading
Google Mobile Services (GMS)
Google Mobile Services (GMS) is a collection of applications and application programming interfaces (APIs) developed by Google for manufacturers of Android devices, such as smartphones and tablets.Continue Reading
push notification
Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.Continue Reading
Android Studio
Android Studio is the official integrated development environment (IDE) for Android application development.Continue Reading
How does Android 13 work profile improve IT management
When users bring personal Android devices to the workplace, IT should consider using work profiles on these devices. Learn about the latest work profile features on Android 13.Continue Reading
Samsung Galaxy
Samsung Galaxy is a product line of Android smartphones, tablets and internet of things devices manufactured by Samsung Electronics.Continue Reading
Google Chrome browser
Google Chrome browser is a free web browser used for accessing the internet and running web-based applications.Continue Reading
Multimedia Messaging Service (MMS)
Multimedia Messaging Service (MMS) is a communications technology developed by 3GPP (Third Generation Partnership Project) to enable the transmission of multimedia content via text message.Continue Reading
Microsoft OneDrive
OneDrive (formerly SkyDrive) is an online cloud storage service from Microsoft.Continue Reading
What is wireless communications? Everything you need to know
Wireless communications is the transmission of voice and data without cable or wires.Continue Reading
Google Hangouts
Google Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chats, either one-on-one or in a group.Continue Reading
SIM card
A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.Continue Reading
wireless access point
A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN), serving as the interconnection point between the WLAN and a fixed wire network.Continue Reading
OTA update (over-the-air update)
An over-the-air (OTA) update is the wireless delivery of new software, firmware or other data to mobile devices.Continue Reading
wireless backhaul
Wireless backhaul is the use of wireless communication systems to transport data between the internet and subnetworks.Continue Reading
Apple User Enrollment
Apple User Enrollment (UE) is a form of mobile device management (MDM) for Apple products that supports iOS 13 and macOS Catalina.Continue Reading
fixed wireless
Fixed wireless networking refers to the operation of wireless devices in fixed locations such as homes and offices.Continue Reading
LDAP (Lightweight Directory Access Protocol)
LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate data about organizations, individuals and other resources such as files and devices in a network -- whether on the public internet or a corporate ...Continue Reading
tvOS
TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.Continue Reading
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a security standard for computing devices equipped with wireless internet connections.Continue Reading
Wireless Application Protocol (WAP)
Wireless Application Protocol (WAP) is a specification for a set of communication protocols to standardize the way wireless devices, such as mobile phones and radio transceivers, can be used for internet access, including email, the web, newsgroups ...Continue Reading
wireless ad hoc network (WANET)
A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless ...Continue Reading
personal area network (PAN)
A personal area network (PAN) interconnects technology devices, typically within the range of a single user, which is approximately 10 meters or 33 feet.Continue Reading
enterprise file sync and share (EFSS)
Enterprise file sync and share (EFSS) is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.Continue Reading
file sharing
File sharing is the public or private sharing of files or folders on a networked computer.Continue Reading
WhatsApp
WhatsApp is a free cross-platform messaging service.Continue Reading
iPhone
The iPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.Continue Reading
m-commerce (mobile commerce)
M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.Continue Reading
microblogging
Microblogging is a short blog post designed for quick and typically direct audience interactions.Continue Reading
How to perform a full remote wipe on an Android device
When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace.Continue Reading
How to create a mobile app for a small business
Regularly updated mobile applications are becoming essential for small businesses. The first step for SMBs is knowing all the options for building and maintaining mobile apps.Continue Reading
How to perform a remote wipe of Office 365 on a smartphone
Employees like having email and other Office 365 applications on their smartphones. There are security risks that come with mobile devices accessing corporate data, however.Continue Reading
mobile computing
Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.Continue Reading
How and when to set up Apple TV with a business account
While organizations can use a business Apple ID account, there are other options -- a personal Apple ID or even no Apple ID may suffice.Continue Reading
consumerization of IT
The consumerization of IT refers to how software and hardware products designed for personal use migrated into the enterprise and were used for work purposes.Continue Reading
wearable technology
Wearable technology is any kind of electronic device designed to be worn on the user's body.Continue Reading
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices.Continue Reading
RPC over HTTP
Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP.Continue Reading
mobile service provider
A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.Continue Reading
near-field communication (NFC)
Near-field communication (NFC) is a short-range wireless connectivity technology that uses magnetic field induction to enable communication between devices when they're touched together or brought within a few centimeters of each other.Continue Reading
device-agnostic (device agnosticism)
Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.Continue Reading
digital video broadcasting (DVB)
Digital video broadcasting (DVB) is a set of standards that define digital broadcasting using DVB satellite, cable and terrestrial broadcasting infrastructures.Continue Reading
Wireless Transport Layer Security (WTLS)
Wireless Transport Layer Security (WTLS) is a security level for the Wireless Application Protocol (WAP), specifically for the applications that use WAP.Continue Reading
electromagnetic interference (EMI)
Electromagnetic interference (EMI) is unwanted noise or interference in an electrical path or circuit caused by an outside source.Continue Reading
Short Message Service (SMS)
SMS (Short Message Service), commonly referred to as 'text messaging,' is a service for sending short messages of up to 160 characters (224 character limit if using a 5-bit mode) to mobile devices, including cellular phones, smartphones and tablets.Continue Reading
short message service center (SMSC)
The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.Continue Reading
HSDPA (High-Speed Downlink Packet Access)
High-Speed Downlink Packet Access (HSPDA) is a packet-based mobile telephony protocol used in 3G Universal Mobile Telecommunications Service (UMTS) radio networks to increase data capacity and speed up download rates.Continue Reading
unzipping
Unzipping is the act of extracting the files from a zipped single file or similar file archive.Continue Reading
application sandboxing
Application sandboxing, also called application containerization, is an approach to software development and management and mobile application management (MAM) that limits the environments in which certain code can execute.Continue Reading
Microsoft Store
The Microsoft Store -- formerly called the Windows Store -- is an online marketplace for consumers to buy and download a variety of items.Continue Reading
mobile platform as a service (mPaaS)
Mobile platform as a service (mPaaS) is a specialized type of PaaS designed to provide an integrated development environment (IDE), deployment platform, lifecycle management and analytics for mobile/web applications.Continue Reading
2D barcode (two-dimensional barcode)
A 2D (two-dimensional) barcode is a graphical image that stores information horizontally as one-dimensional barcodes do, as well as vertically.Continue Reading
When should you use Android Enterprise Essentials?
With the Android Enterprise Essentials program, organizations get simple and basic device management. However, this approach isn't a great fit for all organizations.Continue Reading
satellite
A satellite is any object that orbits something else, as, for example, the Earth orbits the sun.Continue Reading
Global Positioning System (GPS)
The GPS (Global Positioning System) is a 'constellation' of approximately 30 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location.Continue Reading
personal digital assistant (PDA)
Personal digital assistant is a term for a small, mobile, handheld device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedules, calendars and address book information ...Continue Reading
Bluetooth
Bluetooth is a telecommunications industry specification that describes how mobile devices, computers and other devices can easily communicate with each other using a short-range wireless connection.Continue Reading
Mobile application management tools balance service and cost
Finding the right mobile application management tool can be challenging. Discover whether it's best to choose a standalone MAM tool over an integrated EMM suite.Continue Reading
How to enroll iOS devices with Apple User Enrollment
A recently added Apple feature, iPadOS and iOS User Enrollment, helps organizations manage devices with personal data without sacrificing end users' privacy.Continue Reading
How to deploy a mobile threat defense app in 3 scenarios
The mobile threat defense integration and application deployment process differ depending on whether an organization uses MDM, MAM or neither.Continue Reading
COPE (corporate-owned, personally enabled)
COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or ...Continue Reading
Mobile Threat Defense (MTD)
Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.Continue Reading
spectrum efficiency
Spectrum efficiency describes the amount of data transmitted over a given spectrum or bandwidth with minimum transmission errors.Continue Reading
7 mobile device security best practices for businesses
Organizations can't deploy mobile devices without accounting for their security. IT admins should follow these 7 best practices to manage mobile device and data security.Continue Reading
How to deploy configuration profiles on iOS 14 and later
While mobile IT admins can deploy iOS configuration profiles manually or ask users to handle that task, they should learn how to handle mass profile deployments as well.Continue Reading
4G (fourth-generation wireless)
4G is the short name for fourth-generation wireless, the stage of broadband mobile communications that supersedes 3G (third-generation wireless) and is the predecessor of 5G (fifth-generation wireless).Continue Reading
GSM (Global System for Mobile communication)
GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.Continue Reading
MIMO (multiple input, multiple output)
MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).Continue Reading
GPRS (General Packet Radio Services)
General Packet Radio Services (GPRS) is a best-effort packet-switching protocol for wireless and cellular network communication services.Continue Reading
New iOS 14 features that mobile admins should be excited for
With the impending release of iOS 14, mobile admins should learn the advancements that iOS 14 can offer and how the features can make a major difference in the enterprise.Continue Reading
enterprise mobility management (EMM)
Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.Continue Reading
telecommuting
Telecommuting is an arrangement to work outside the traditional office or workplace, usually at home or in a mobile situation.Continue Reading
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API.Continue Reading