Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
Explore the features of unified endpoint management
UEM can ease pain points for IT or it could create complications. To decide whether this is a good approach, IT pros should do their research. Continue Reading
Take a mobile-first approach to digital transformation
There's no denying it: Smartphones have changed everything, from personal life to business. Get on board with digital transformation. Continue Reading
Mobile is at the forefront of digital transformation trends
As 'digital transformation' dominates discussion, understand why it's important to keep mobile at the forefront of the initiative -- and what you can do to get started. Continue Reading
-
Explore the pros and cons of identity federation management
Identity federation is a relatively new technology in mobile, but it comes with challenges. Understand how to make deployment painless before adopting it. Continue Reading
Five steps to effective usability testing for mobile apps
To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it out. These tips can help perfect the process. Continue Reading
The new role of identity and authentication in the enterprise
It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills the need -- but you'll need to navigate it first.Continue Reading
How to approach mobile password management for the enterprise
When simple passwords no longer provide sufficient security, look to other options. Here are some ways to modernize password management for your enterprise.Continue Reading
Tighten mobile security for the enterprise with new strategies
It's important to update your organization's mobile security strategy. Stay informed with new security methods, such as biometric authentication and edge gateways.Continue Reading
Simplify mobile app development for the enterprise
Without the right resources, app dev can be complicated. Start out the process on the right foot and have all the best tools in your arsenal to avoid a development dilemma.Continue Reading
A handy mobile app testing checklist for developers
Application testing is a necessity in the era of enterprise mobility. Define the right testing criteria and adopt the proper tools to build and deliver high-quality mobile apps.Continue Reading
-
Buy the right enterprise mobile devices for your workers
Tablets and smartphones are a growing must-have for modern workers. Learn how you can sort through the vast array of options and determine the best vendors for your organization.Continue Reading
How to choose the best identity access management software
Many IAM products flood today's market, with a variety of different features. Prioritize which capabilities are essential to the business before you make a final decision.Continue Reading
A mobile app security checklist for developers
When developing an app, security should be the number one priority. Review these tips for ensuring rock-solid security for your enterprise mobile app.Continue Reading
What are the biggest mobile device security threats?
As long as there are mobile devices, there will always be security risks for organizations to face. Four IT professionals share what they think the worst issues are today.Continue Reading
How IT can develop and deploy mobile apps
If IT's goal is to get enterprise mobile apps to employees, there are several ways to go about it. The top development and deployment approaches are popular for a reason.Continue Reading
VMware AirWatch
VMware AirWatch is an enterprise mobility software provider based in Atlanta. AirWatch, a division of virtualization vendor VMware, provides technologies that help IT administrators deploy, secure and manage mobile devices, applications and data, as...Continue Reading
An introduction to mobile application design
Mobile application design isn't always easy. An effective design keeps user experience at the forefront of the design process. Without that, an enterprise mobile app could fail.Continue Reading
Apple 3D Touch
Apple 3D Touch is a pressure-sensitive feature first included in iPhone 6s and 6s Plus that triggers different actions based on how much force the user puts on the screen.Continue Reading
Apple TV (Apple TV 4)
Apple TV is a set-top box that allows end users to stream multimedia content from the Internet over a television.Continue Reading
iOS developer kit
The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple’s mobile operating system.Continue Reading
Three essentials for an effective mobile app strategy
With mobile apps invading the enterprise, it's time to develop a strategy using a set of universal app development tools.Continue Reading
What are the best ways to use tablets for business?
As more enterprises begin to support tablets, many users find that the screen size and portability provides the right balance for common work-related tasks such as note taking.Continue Reading
Android device management: Everything you need to know in one guide
The Google Android mobile operating system runs on a wide variety of devices. Learn how IT can manage and secure such a diverse OS in the enterprise.Continue Reading
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys.Continue Reading
Setting standards for in-house app development and delivery
As with anything, mobile application development goes best when IT comes in with a well-thought-out plan. Learn how to optimize your app dev and delivery process.Continue Reading
Get to know Android for Work profiles and productivity features
Now that Android for Work is out, we dig into the features of the program’s work profiles and productivity apps.Continue Reading
What's new in Windows 10? Test your knowledge of the new OS
Microsoft has previewed several new mobility features in Windows 10, from a universal OS to better interactions on 2-in-1 devices. See if you've been paying close attention.Continue Reading
Apple Device Enrollment Program streamlines deployment, MDM
The Apple Device Enrollment Program allows IT pros to automate deployment, and they can also preset mandatory MDM configurations out of the box.Continue Reading
Rooted Android device risks include network access, data theft
Rooting an Android smartphone or tablet makes the device more vulnerable to malicious apps that could wreak havoc on a corporate network. MDM alone can't stop the threat.Continue Reading
How Box integration works with other enterprise apps
To get the most out of Box, use its APIs to integrate your enterprise applications with its cloud storage platform.Continue Reading
Pros and cons of using secure containers for mobile device security
With BYOD on the rise, IT needs to keep sensitive corporate information safe. Secure containers are one way to do that, but when’s best to use them?Continue Reading
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use.Continue Reading
Everything you need to know about developing mobile apps
Developing mobile apps for your users can help them be more productive, but before you start building apps, learn about the different kinds.Continue Reading
Dual-persona technology: What it is and how it works
Dual-persona technology is still new, so IT pros want to know how it works and what the drawbacks are. Check out this FAQ for those answers and more.Continue Reading
BYOD challenges and advantages: Test your knowledge
Like many things in IT, there are BYOD challenges and advantages. Take this quiz and see how much you know about the pros and cons.Continue Reading
Mobile application delivery: How to do it and what to beware of
Mobile application delivery is a tough nut to crack. Every delivery option has drawbacks, such as cost, connectivity and user experience.Continue Reading
LTE-Advanced (Long Term Evolution-Advanced)
Long Term Evolution-Advanced (LTE-Advanced) is a cellular networking standard that offers higher throughput than its predecessor, the Long Term Evolution (LTE) standard.Continue Reading
app store (application store)
An app store (application store) is an online portal through which software programs are made available for procurement and download.Continue Reading
How personal email and the cloud are changing corporate email access
Employees' cloud and personal email accounts help them get work done, but email forwarding and cloud integration could make work tougher for IT.Continue Reading
Android device and security quiz
Despite their reputation for shoddy security, different Android devices and versions offer security and management features for IT. Test your Android knowledge.Continue Reading
Business cloud storage and file-sharing quiz
Test your knowledge of business cloud storage services and how to pick the right one for your company in this eight-question quiz.Continue Reading
mobile printing
Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.Continue Reading
Mobile data security quiz: Test your knowledge
Data security approaches have changed since workers have become more mobile. Take this quiz to see how much you know about keeping mobile data safe.Continue Reading
What, why and how: An enterprise MDM quiz
Many companies struggle to manage workers' devices. Have you tried MDM? See how much you know about enterprise MDM before implementing a system.Continue Reading
Nexus
Nexus is a series of smartphones and tablets manufactured by Google and its hardware partners. Nexus devices run the native Android operating system.Continue Reading
iPhone Configuration Utility
The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.Continue Reading
Quiz: Managing mobile devices in a health care setting
As smartphones and tablet PCs make their way into health care organizations, IT departments face many challenges. Take this quiz to see what you know about managing mobile devices.Continue Reading
fixed-mobile convergence (FMC)
Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks... (Continued)Continue Reading
RMON (Remote Network Monitoring)
RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central ...Continue Reading
real-time location system (RTLS)
A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.Continue Reading
camcorder (camera recorder)
A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.Continue Reading
wireless charging
Wireless charging is any of several methods of charging batteries without the use of cables. The three main methods of wireless charging are radio charging, resonance charging and inductive charging... (Continued)Continue Reading
resonance charging
Resonance charging is a wireless charging method for items that require large amounts of power, such as an electric car, robot, vacuum cleaner or laptop computer. The method works over small distances (3-5 meters)... (Continued)Continue Reading
Opera
Opera is a Web browser that provides some advantages over the two most popular browsers from Netscape and Microsoft...(Continued)Continue Reading
Web texting
Web texting is two-way text messaging from the Web to a handheld mobile device, usually a cellular phone.Continue Reading
SMS gateway
An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway. An SMS gateway can also serve as an international gateway for users with roaming capability, allowing SMS ...Continue Reading
common short code (CSC)
Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones. Common short codes may also be called mobile short codes or short numbers... (Continued)Continue Reading
SMS spam (cell phone spam or short messaging service spam)
SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly rare in North America, but has been common in Japan for years. In 2001-2002...Continue Reading
unlocked cell phone
An unlocked cell phone is a cellular telephone handset that can be used with more than one service provider, making it easy for a user to switch from one cellular network to another... (Continued)Continue Reading