Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
wireless ad hoc network (WANET)
A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless ... Continue Reading
personal area network (PAN)
A personal area network (PAN) interconnects technology devices, typically within the range of a single user, which is approximately 10 meters or 33 feet. Continue Reading
enterprise file sync and share (EFSS)
Enterprise file sync and share (EFSS) is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices. Continue Reading
-
file sharing
File sharing is the public or private sharing of files or folders on a networked computer. Continue Reading
WhatsApp
WhatsApp is a free cross-platform messaging service. Continue Reading
m-commerce (mobile commerce)
M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.Continue Reading
microblogging
Microblogging is a short blog post designed for quick and typically direct audience interactions.Continue Reading
How to perform a full remote wipe on an Android device
When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace.Continue Reading
How to create a mobile app for a small business
Regularly updated mobile applications are becoming essential for small businesses. The first step for SMBs is knowing all the options for building and maintaining mobile apps.Continue Reading
How to perform a remote wipe of Office 365 on a smartphone
Employees like having email and other Office 365 applications on their smartphones. There are security risks that come with mobile devices accessing corporate data, however.Continue Reading
-
mobile computing
Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.Continue Reading
How and when to set up Apple TV with a business account
While organizations can use a business Apple ID account, there are other options -- a personal Apple ID or even no Apple ID may suffice.Continue Reading
consumerization of IT
The consumerization of IT refers to how software and hardware products designed for personal use migrated into the enterprise and were used for work purposes.Continue Reading
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices.Continue Reading
RPC over HTTP
Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP.Continue Reading
mobile service provider
A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.Continue Reading
near-field communication (NFC)
Near-field communication (NFC) is a short-range wireless connectivity technology that uses magnetic field induction to enable communication between devices when they're touched together or brought within a few centimeters of each other.Continue Reading
device-agnostic (device agnosticism)
Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.Continue Reading
digital video broadcasting (DVB)
Digital video broadcasting (DVB) is a set of standards that define digital broadcasting using DVB satellite, cable and terrestrial broadcasting infrastructures.Continue Reading
Wireless Transport Layer Security (WTLS)
Wireless Transport Layer Security (WTLS) is a security level for the Wireless Application Protocol (WAP), specifically for the applications that use WAP.Continue Reading
electromagnetic interference (EMI)
Electromagnetic interference (EMI) is unwanted noise or interference in an electrical path or circuit caused by an outside source.Continue Reading
Short Message Service (SMS)
SMS (Short Message Service), commonly referred to as 'text messaging,' is a service for sending short messages of up to 160 characters (224 character limit if using a 5-bit mode) to mobile devices, including cellular phones, smartphones and tablets.Continue Reading
short message service center (SMSC)
The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.Continue Reading
HSDPA (High-Speed Downlink Packet Access)
High-Speed Downlink Packet Access (HSPDA) is a packet-based mobile telephony protocol used in 3G Universal Mobile Telecommunications Service (UMTS) radio networks to increase data capacity and speed up download rates.Continue Reading
unzipping
Unzipping is the act of extracting the files from a zipped single file or similar file archive.Continue Reading
application sandboxing
Application sandboxing, also called application containerization, is an approach to software development and management and mobile application management (MAM) that limits the environments in which certain code can execute.Continue Reading
Microsoft Store
The Microsoft Store -- formerly called the Windows Store -- is an online marketplace for consumers to buy and download a variety of items.Continue Reading
mobile platform as a service (mPaaS)
Mobile platform as a service (mPaaS) is a specialized type of PaaS designed to provide an integrated development environment (IDE), deployment platform, lifecycle management and analytics for mobile/web applications.Continue Reading
2D barcode (two-dimensional barcode)
A 2D (two-dimensional) barcode is a graphical image that stores information horizontally as one-dimensional barcodes do, as well as vertically.Continue Reading
When should you use Android Enterprise Essentials?
With the Android Enterprise Essentials program, organizations get simple and basic device management. However, this approach isn't a great fit for all organizations.Continue Reading
satellite
A satellite is any object that orbits something else, as, for example, the Earth orbits the sun.Continue Reading
Global Positioning System (GPS)
The GPS (Global Positioning System) is a 'constellation' of approximately 30 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location.Continue Reading
personal digital assistant (PDA)
Personal digital assistant is a term for a small, mobile, handheld device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedules, calendars and address book information ...Continue Reading
Bluetooth
Bluetooth is a telecommunications industry specification that describes how mobile devices, computers and other devices can easily communicate with each other using a short-range wireless connection.Continue Reading
Mobile application management tools balance service and cost
Finding the right mobile application management tool can be challenging. Discover whether it's best to choose a standalone MAM tool over an integrated EMM suite.Continue Reading
How to enroll iOS devices with Apple User Enrollment
A recently added Apple feature, iPadOS and iOS User Enrollment, helps organizations manage devices with personal data without sacrificing end users' privacy.Continue Reading
How to deploy a mobile threat defense app in 3 scenarios
The mobile threat defense integration and application deployment process differ depending on whether an organization uses MDM, MAM or neither.Continue Reading
COPE (corporate-owned, personally enabled)
COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or ...Continue Reading
Mobile Threat Defense (MTD)
Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.Continue Reading
spectrum efficiency
Spectrum efficiency describes the amount of data transmitted over a given spectrum or bandwidth with minimum transmission errors.Continue Reading
7 mobile device security best practices for businesses
Organizations can't deploy mobile devices without accounting for their security. IT admins should follow these 7 best practices to manage mobile device and data security.Continue Reading
How to deploy configuration profiles on iOS 14 and later
While mobile IT admins can deploy iOS configuration profiles manually or ask users to handle that task, they should learn how to handle mass profile deployments as well.Continue Reading
4G (fourth-generation wireless)
4G is the short name for fourth-generation wireless, the stage of broadband mobile communications that supersedes 3G (third-generation wireless) and is the predecessor of 5G (fifth-generation wireless).Continue Reading
GSM (Global System for Mobile communication)
GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.Continue Reading
MIMO (multiple input, multiple output)
MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).Continue Reading
GPRS (General Packet Radio Services)
General Packet Radio Services (GPRS) is a best-effort packet-switching protocol for wireless and cellular network communication services.Continue Reading
New iOS 14 features that mobile admins should be excited for
With the impending release of iOS 14, mobile admins should learn the advancements that iOS 14 can offer and how the features can make a major difference in the enterprise.Continue Reading
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API.Continue Reading
How can IT manage Android Things devices in the enterprise?
The Android Things program provides APIs that link atypical Android devices to Android smartphone management tools, so mobile admins must learn to manage Android Things devices.Continue Reading
What Android security threats should IT know about?
Mobile admins must understand the nature of the most recent Android security threats so they can protect users, but it's crucial to know where these verified threats are listed.Continue Reading
Ownership scenario should dictate mobile device policies
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions.Continue Reading
New Apple MDM terms iOS admins should know
Apple introduced a new BYOD-friendly management mode for iOS and macOS and renamed the existing Apple MDM modes. Get up to speed with the three new terms.Continue Reading
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well.Continue Reading
Enterprise mobility management software offerings and use cases
IT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market.Continue Reading
Clear up the confusion about end-user computing
Today's end-user computing industry is the culmination of a decade of changes in mobility, desktops, virtualization and more. Dive in to what really qualifies as EUC.Continue Reading
Top 3 emerging mobile app development trends for 2019
These three emerging mobile app development strategies could change the way apps are developed in the future. Discover which of these methods is right for your organization.Continue Reading
Intro to iPhone encryption features for Apple admins
Encryption for iOS devices comes baked into the device itself, but iOS devices also have some significant enterprise-level protections that IT must enable and deploy policies for.Continue Reading
How the Intune App Wrapping Tool works for Android
Mobile application wrapping is an effective way to deploy policies that can't normally interact with an app. Learn how IT can use Intune's wrapping tool on Android apps.Continue Reading
Transition to Android Enterprise management before Android Q
With the upcoming deprecation of Device Admin APIs, IT should look at the possibility of migration to Android Enterprise, Google's endorsed API program, for device management.Continue Reading
Best smartphone for business use relies on many key factors
Operating systems and security protection are among the key considerations when companies select smartphones for business use. Learn more about device options and decision points.Continue Reading
Considerations for choosing enterprise mobility tools
Mobile device management may be long gone, but IT pros still have many options to enroll, secure and manage their organization's fleet of mobile devices. Discover what the options are.Continue Reading
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods.Continue Reading
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services.Continue Reading
The end of hybrid Intune MDM and what IT needs to know
Some Microsoft Intune admins are unsure of what to do after the death of Intune hybrid MDM. IT should consider Azure or other MDM platforms to maintain key functions.Continue Reading
Does enterprise file sync and share work on mobile devices?
Users who work with file sync-and-share apps on their mobile devices should be aware that auto-syncing works differently and that there are more security risks.Continue Reading
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work.Continue Reading
Mobile application developer skills to know for an interview
One of the best ways to succeed in your mobile app dev career is to master the art of the interview. Review need-to-know technical skills and how to communicate them effectively.Continue Reading
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape.Continue Reading
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices.Continue Reading
How can organizations implement mobile app personalization?
Organizations that want to boost user engagement on a mobile app should use personalization. They can follow these steps to implement personalization effectively.Continue Reading
Evernote mobile app helps fill productivity gaps
Taking and organizing notes is an important part of many employees' jobs. Evernote can help business users manage notes, which can be even more critical on mobile devices.Continue Reading
What are the benefits of QR code enrollment?
IT can enroll devices into MDM using a QR code, which is a more attainable option as support expands. Discover the benefits of this process, including improved workflow and ease of use.Continue Reading
The complete Apple iOS guide for IT administrators
Apple iOS has become a legitimate enterprise option. IT admins must know about its security capabilities and how to manage devices. Developers should also learn the ins and outs of iOS app development.Continue Reading
Stay updated on the Android Enterprise Recommended program
Google made a few updates to Android Enterprise Recommended. Explore recent offerings from the proprietary Android enterprise device program, including support for rugged devices.Continue Reading
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps.Continue Reading
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system.Continue Reading
Mobile app testing tools embrace automation, open source
Organizations should think about mobile app testing from the beginning. Discover other best practices from the CTO of Sauce Labs, a mobile app testing company.Continue Reading
What mobile device analytics can do for you
The hype around analytics is real. When it comes to mobile, this technology can help IT administrators glean more information about users, business processes and more.Continue Reading
Pros of dedicated API services for cross-platform mobile apps
One API can rule them all -- but developers shouldn't be surprised if problems occur. Delve into the pros and cons of dedicated API services for cross-platform apps.Continue Reading
What are the benefits of mobile app A/B testing?
Mobile app A/B testing is the best way to prevent buggy features from reaching your users. Learn the benefits and discover how to get started with the process.Continue Reading
Pros and cons of a low-code platform for mobile
Low-code platforms for mobile app development come with plenty of controversy. Discover why developers hate them and how organizations can use them to empower end users.Continue Reading
How to create an inclusive endpoint management strategy
Smartwatches, IoT devices and sensors -- oh my! Endpoint management can get confusing quickly, but you can figure it out by answering these questions.Continue Reading
How virtual assistant technology will affect the enterprise
Mobile devices with AI and virtual assistants will affect the enterprise, as well as consumers. Learn how to prep your organization for the future.Continue Reading
How to implement tablets for enterprise use
To integrate tablets into the enterprise, IT needs to know more than just which tablet is the best fit. Discover the tools that can help IT enroll and maintain the new devices.Continue Reading
How Apple DEP works and why it's important
Apple's DEP was the groundbreaking template for the future of endpoint provisioning. The program helps businesses and educators simplify enrollment and management.Continue Reading
Unpack the role of Google's Flutter app dev framework
Google's new cross-platform framework, Flutter, could threaten Android's existence. Explore three theories about why the company developed its new tool.Continue Reading
Ruggedized devices face a mobile-fueled transition
The next generation of smartphones is more rugged than ever, and this trend will change the ruggedized device market. Learn how and know what to expect in the next few years.Continue Reading
Developers reap benefits of iOS app modules with Swift
Many developers recognize the benefits of app modularization. Historically, it's been difficult to begin the process, but now changes from Apple provide more opportunity.Continue Reading
Test your knowledge of mobile app programming languages
Do you know the difference between native, web-based and hybrid mobile apps? Test your knowledge of mobile app development and languages with this quiz.Continue Reading
On-device machine learning offers security, reduced latency
Where should IT process machine learning data? Mobile devices can now process machine learning, but it's important to evaluate all the options -- including the cloud.Continue Reading
Develop an IAM strategy for the mobile enterprise
As the role of IAM evolves, it's important to be aware of current and future technologies. IT teams should review their needs, as well as the pros and cons of IAM, before deciding.Continue Reading
Three questions to fuel a mobile app development project
It's not cheap to build a mobile app, so IT pros should do their research first. Here's how to determine the cost and discover which tools and trends your organization should adopt.Continue Reading
Mobility strategies shift toward UEM, IAM in 2018
IT is changing priorities when it comes to fitting mobile management into end-user computing strategies. Learn what some recent stats show about the new age of mobile.Continue Reading
What to know before implementing an IAM system
IT administrators have many features to choose from and requirements to meet when looking for an IAM tool. Check these boxes before committing to IAM.Continue Reading
How well do you know EMM platforms?
Enterprise mobility management is made up of many different facets, including MDM and MCM. Do you know the difference between them? Test your knowledge with this quiz.Continue Reading
How to track mobile app performance metrics
Developers that don't track mobile app health will get little insight into the user experience. Learn these effective strategies to track and understand mobile app performance metrics.Continue Reading
Pros and cons of AI for mobile IT
Mobile IT admins should be prepared to take advantage of artificial intelligence technologies, but it's important to be aware of the risks and challenges involved, as well.Continue Reading
How should IT handle app onboarding for employees?
When it comes to onboarding a mobile app for internal use, IT should make the process as easy as possible. Here are several strategies to help.Continue Reading
IT must prep for enterprise AI software
AI technology is growing fast, and end-user computing administrators need to be prepared for the multitude of benefits it can bring IT and employees.Continue Reading
Understand chatbot use cases and features for business
The bot that chattered with you over AOL Instant Messenger isn't too far off from the way chatbot technology can work in corporate mobile apps.Continue Reading