Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
short message service center (SMSC)
The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations. Continue Reading
HSDPA (High-Speed Downlink Packet Access)
High-Speed Downlink Packet Access (HSPDA) is a packet-based mobile telephony protocol used in 3G Universal Mobile Telecommunications Service (UMTS) radio networks to increase data capacity and speed up download rates. Continue Reading
unzipping
Unzipping is the act of extracting the files from a zipped single file or similar file archive. Continue Reading
-
application sandboxing
Application sandboxing, also called application containerization, is an approach to software development and management and mobile application management (MAM) that limits the environments in which certain code can execute. Continue Reading
Microsoft Store
The Microsoft Store -- formerly called the Windows Store -- is an online marketplace for consumers to buy and download a variety of items. Continue Reading
mobile platform as a service (mPaaS)
Mobile platform as a service (mPaaS) is a specialized type of PaaS designed to provide an integrated development environment (IDE), deployment platform, lifecycle management and analytics for mobile/web applications.Continue Reading
2D barcode (two-dimensional barcode)
A 2D (two-dimensional) barcode is a graphical image that stores information horizontally as one-dimensional barcodes do, as well as vertically.Continue Reading
When should you use Android Enterprise Essentials?
With the Android Enterprise Essentials program, organizations get simple and basic device management. However, this approach isn't a great fit for all organizations.Continue Reading
satellite
A satellite is any object that orbits something else, as, for example, the Earth orbits the sun.Continue Reading
Global Positioning System (GPS)
The GPS (Global Positioning System) is a 'constellation' of approximately 30 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location.Continue Reading
-
personal digital assistant (PDA)
Personal digital assistant is a term for a small, mobile, handheld device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedules, calendars and address book information ...Continue Reading
Bluetooth
Bluetooth is a telecommunications industry specification that describes how mobile devices, computers and other devices can easily communicate with each other using a short-range wireless connection.Continue Reading
Mobile application management tools balance service and cost
Finding the right mobile application management tool can be challenging. Discover whether it's best to choose a standalone MAM tool over an integrated EMM suite.Continue Reading
How to enroll iOS devices with Apple User Enrollment
A recently added Apple feature, iPadOS and iOS User Enrollment, helps organizations manage devices with personal data without sacrificing end users' privacy.Continue Reading
How to deploy a mobile threat defense app in 3 scenarios
The mobile threat defense integration and application deployment process differ depending on whether an organization uses MDM, MAM or neither.Continue Reading
COPE (corporate-owned, personally enabled)
COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or ...Continue Reading
Mobile Threat Defense (MTD)
Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.Continue Reading
spectrum efficiency
Spectrum efficiency describes the amount of data transmitted over a given spectrum or bandwidth with minimum transmission errors.Continue Reading
7 mobile device security best practices for businesses
Organizations can't deploy mobile devices without accounting for their security. IT admins should follow these 7 best practices to manage mobile device and data security.Continue Reading
How to deploy configuration profiles on iOS 14 and later
While mobile IT admins can deploy iOS configuration profiles manually or ask users to handle that task, they should learn how to handle mass profile deployments as well.Continue Reading
4G (fourth-generation wireless)
4G is the short name for fourth-generation wireless, the stage of broadband mobile communications that supersedes 3G (third-generation wireless) and is the predecessor of 5G (fifth-generation wireless).Continue Reading
GSM (Global System for Mobile communication)
GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.Continue Reading
MIMO (multiple input, multiple output)
MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).Continue Reading
GPRS (General Packet Radio Services)
General Packet Radio Services (GPRS) is a best-effort packet-switching protocol for wireless and cellular network communication services.Continue Reading
New iOS 14 features that mobile admins should be excited for
With the impending release of iOS 14, mobile admins should learn the advancements that iOS 14 can offer and how the features can make a major difference in the enterprise.Continue Reading
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API.Continue Reading
How can IT manage Android Things devices in the enterprise?
The Android Things program provides APIs that link atypical Android devices to Android smartphone management tools, so mobile admins must learn to manage Android Things devices.Continue Reading
What Android security threats should IT know about?
Mobile admins must understand the nature of the most recent Android security threats so they can protect users, but it's crucial to know where these verified threats are listed.Continue Reading
Ownership scenario should dictate mobile device policies
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions.Continue Reading
New Apple MDM terms iOS admins should know
Apple introduced a new BYOD-friendly management mode for iOS and macOS and renamed the existing Apple MDM modes. Get up to speed with the three new terms.Continue Reading
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well.Continue Reading
Enterprise mobility management software offerings and use cases
IT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market.Continue Reading
Clear up the confusion about end-user computing
Today's end-user computing industry is the culmination of a decade of changes in mobility, desktops, virtualization and more. Dive in to what really qualifies as EUC.Continue Reading
Top 3 emerging mobile app development trends for 2019
These three emerging mobile app development strategies could change the way apps are developed in the future. Discover which of these methods is right for your organization.Continue Reading
Intro to iPhone encryption features for Apple admins
Encryption for iOS devices comes baked into the device itself, but iOS devices also have some significant enterprise-level protections that IT must enable and deploy policies for.Continue Reading
How the Intune App Wrapping Tool works for Android
Mobile application wrapping is an effective way to deploy policies that can't normally interact with an app. Learn how IT can use Intune's wrapping tool on Android apps.Continue Reading
Transition to Android Enterprise management before Android Q
With the upcoming deprecation of Device Admin APIs, IT should look at the possibility of migration to Android Enterprise, Google's endorsed API program, for device management.Continue Reading
Best smartphone for business use relies on many key factors
Operating systems and security protection are among the key considerations when companies select smartphones for business use. Learn more about device options and decision points.Continue Reading
Considerations for choosing enterprise mobility tools
Mobile device management may be long gone, but IT pros still have many options to enroll, secure and manage their organization's fleet of mobile devices. Discover what the options are.Continue Reading
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods.Continue Reading
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services.Continue Reading
The end of hybrid Intune MDM and what IT needs to know
Some Microsoft Intune admins are unsure of what to do after the death of Intune hybrid MDM. IT should consider Azure or other MDM platforms to maintain key functions.Continue Reading
Google Play (Android Market)
Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.Continue Reading
Does enterprise file sync and share work on mobile devices?
Users who work with file sync-and-share apps on their mobile devices should be aware that auto-syncing works differently and that there are more security risks.Continue Reading
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work.Continue Reading
Mobile application developer skills to know for an interview
One of the best ways to succeed in your mobile app dev career is to master the art of the interview. Review need-to-know technical skills and how to communicate them effectively.Continue Reading
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape.Continue Reading
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices.Continue Reading
How can organizations implement mobile app personalization?
Organizations that want to boost user engagement on a mobile app should use personalization. They can follow these steps to implement personalization effectively.Continue Reading
Evernote mobile app helps fill productivity gaps
Taking and organizing notes is an important part of many employees' jobs. Evernote can help business users manage notes, which can be even more critical on mobile devices.Continue Reading
What are the benefits of QR code enrollment?
IT can enroll devices into MDM using a QR code, which is a more attainable option as support expands. Discover the benefits of this process, including improved workflow and ease of use.Continue Reading
The complete Apple iOS guide for IT administrators
Apple iOS has become a legitimate enterprise option. IT admins must know about its security capabilities and how to manage devices. Developers should also learn the ins and outs of iOS app development.Continue Reading
Stay updated on the Android Enterprise Recommended program
Google made a few updates to Android Enterprise Recommended. Explore recent offerings from the proprietary Android enterprise device program, including support for rugged devices.Continue Reading
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps.Continue Reading
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system.Continue Reading
Mobile app testing tools embrace automation, open source
Organizations should think about mobile app testing from the beginning. Discover other best practices from the CTO of Sauce Labs, a mobile app testing company.Continue Reading
What mobile device analytics can do for you
The hype around analytics is real. When it comes to mobile, this technology can help IT administrators glean more information about users, business processes and more.Continue Reading
Pros of dedicated API services for cross-platform mobile apps
One API can rule them all -- but developers shouldn't be surprised if problems occur. Delve into the pros and cons of dedicated API services for cross-platform apps.Continue Reading
What are the benefits of mobile app A/B testing?
Mobile app A/B testing is the best way to prevent buggy features from reaching your users. Learn the benefits and discover how to get started with the process.Continue Reading
Pros and cons of a low-code platform for mobile
Low-code platforms for mobile app development come with plenty of controversy. Discover why developers hate them and how organizations can use them to empower end users.Continue Reading
How to create an inclusive endpoint management strategy
Smartwatches, IoT devices and sensors -- oh my! Endpoint management can get confusing quickly, but you can figure it out by answering these questions.Continue Reading
How virtual assistant technology will affect the enterprise
Mobile devices with AI and virtual assistants will affect the enterprise, as well as consumers. Learn how to prep your organization for the future.Continue Reading
How to implement tablets for enterprise use
To integrate tablets into the enterprise, IT needs to know more than just which tablet is the best fit. Discover the tools that can help IT enroll and maintain the new devices.Continue Reading
How Apple DEP works and why it's important
Apple's DEP was the groundbreaking template for the future of endpoint provisioning. The program helps businesses and educators simplify enrollment and management.Continue Reading
Unpack the role of Google's Flutter app dev framework
Google's new cross-platform framework, Flutter, could threaten Android's existence. Explore three theories about why the company developed its new tool.Continue Reading
Ruggedized devices face a mobile-fueled transition
The next generation of smartphones is more rugged than ever, and this trend will change the ruggedized device market. Learn how and know what to expect in the next few years.Continue Reading
Developers reap benefits of iOS app modules with Swift
Many developers recognize the benefits of app modularization. Historically, it's been difficult to begin the process, but now changes from Apple provide more opportunity.Continue Reading
Test your knowledge of mobile app programming languages
Do you know the difference between native, web-based and hybrid mobile apps? Test your knowledge of mobile app development and languages with this quiz.Continue Reading
On-device machine learning offers security, reduced latency
Where should IT process machine learning data? Mobile devices can now process machine learning, but it's important to evaluate all the options -- including the cloud.Continue Reading
Develop an IAM strategy for the mobile enterprise
As the role of IAM evolves, it's important to be aware of current and future technologies. IT teams should review their needs, as well as the pros and cons of IAM, before deciding.Continue Reading
Three questions to fuel a mobile app development project
It's not cheap to build a mobile app, so IT pros should do their research first. Here's how to determine the cost and discover which tools and trends your organization should adopt.Continue Reading
Mobility strategies shift toward UEM, IAM in 2018
IT is changing priorities when it comes to fitting mobile management into end-user computing strategies. Learn what some recent stats show about the new age of mobile.Continue Reading
What to know before implementing an IAM system
IT administrators have many features to choose from and requirements to meet when looking for an IAM tool. Check these boxes before committing to IAM.Continue Reading
How well do you know EMM platforms?
Enterprise mobility management is made up of many different facets, including MDM and MCM. Do you know the difference between them? Test your knowledge with this quiz.Continue Reading
How to track mobile app performance metrics
Developers that don't track mobile app health will get little insight into the user experience. Learn these effective strategies to track and understand mobile app performance metrics.Continue Reading
Pros and cons of AI for mobile IT
Mobile IT admins should be prepared to take advantage of artificial intelligence technologies, but it's important to be aware of the risks and challenges involved, as well.Continue Reading
How should IT handle app onboarding for employees?
When it comes to onboarding a mobile app for internal use, IT should make the process as easy as possible. Here are several strategies to help.Continue Reading
IT must prep for enterprise AI software
AI technology is growing fast, and end-user computing administrators need to be prepared for the multitude of benefits it can bring IT and employees.Continue Reading
Understand chatbot use cases and features for business
The bot that chattered with you over AOL Instant Messenger isn't too far off from the way chatbot technology can work in corporate mobile apps.Continue Reading
Explore the features of unified endpoint management
UEM can ease pain points for IT or it could create complications. To decide whether this is a good approach, IT pros should do their research.Continue Reading
Take a mobile-first approach to digital transformation
There's no denying it: Smartphones have changed everything, from personal life to business. Get on board with digital transformation.Continue Reading
Mobile is at the forefront of digital transformation trends
As 'digital transformation' dominates discussion, understand why it's important to keep mobile at the forefront of the initiative -- and what you can do to get started.Continue Reading
Explore the pros and cons of identity federation management
Identity federation is a relatively new technology in mobile, but it comes with challenges. Understand how to make deployment painless before adopting it.Continue Reading
Five steps to effective usability testing for mobile apps
To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it out. These tips can help perfect the process.Continue Reading
The new role of identity and authentication in the enterprise
It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills the need -- but you'll need to navigate it first.Continue Reading
How to approach mobile password management for the enterprise
When simple passwords no longer provide sufficient security, look to other options. Here are some ways to modernize password management for your enterprise.Continue Reading
Tighten mobile security for the enterprise with new strategies
It's important to update your organization's mobile security strategy. Stay informed with new security methods, such as biometric authentication and edge gateways.Continue Reading
Simplify mobile app development for the enterprise
Without the right resources, app dev can be complicated. Start out the process on the right foot and have all the best tools in your arsenal to avoid a development dilemma.Continue Reading
A handy mobile app testing checklist for developers
Application testing is a necessity in the era of enterprise mobility. Define the right testing criteria and adopt the proper tools to build and deliver high-quality mobile apps.Continue Reading
Buy the right enterprise mobile devices for your workers
Tablets and smartphones are a growing must-have for modern workers. Learn how you can sort through the vast array of options and determine the best vendors for your organization.Continue Reading
How to choose the best identity access management software
Many IAM products flood today's market, with a variety of different features. Prioritize which capabilities are essential to the business before you make a final decision.Continue Reading
A mobile app security checklist for developers
When developing an app, security should be the number one priority. Review these tips for ensuring rock-solid security for your enterprise mobile app.Continue Reading
What are the biggest mobile device security threats?
As long as there are mobile devices, there will always be security risks for organizations to face. Four IT professionals share what they think the worst issues are today.Continue Reading
iPad
The iPad is a touchscreen tablet PC made by Apple.Continue Reading
How IT can develop and deploy mobile apps
If IT's goal is to get enterprise mobile apps to employees, there are several ways to go about it. The top development and deployment approaches are popular for a reason.Continue Reading
FaceTime
FaceTime is an Apple video telephony application that allows users to make a video call over the internet with a forward-facing camera on iOS and macOS devices.Continue Reading
VMware AirWatch
VMware AirWatch is an enterprise mobility software provider based in Atlanta. AirWatch, a division of virtualization vendor VMware, provides technologies that help IT administrators deploy, secure and manage mobile devices, applications and data, as...Continue Reading
Wi-Fi (802.11x standard)
Wi-Fi is the popular term for high-frequency wireless local area network (WLAN) technology and a standard that has gained acceptance in many companies as an alternative to a wired LAN.Continue Reading
tablet (tablet PC)
A tablet is a wireless, portable personal computer with a touchscreen interface. The tablet form factor is typically smaller than a notebook computer, but larger than a smartphone.Continue Reading
An introduction to mobile application design
Mobile application design isn't always easy. An effective design keeps user experience at the forefront of the design process. Without that, an enterprise mobile app could fail.Continue Reading