Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
Apple 3D Touch
Apple 3D Touch is a pressure-sensitive feature first included in iPhone 6s and 6s Plus that triggers different actions based on how much force the user puts on the screen. Continue Reading
Apple TV (Apple TV 4)
Apple TV is a set-top box that allows end users to stream multimedia content from the Internet over a television. Continue Reading
iOS developer kit
The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple’s mobile operating system. Continue Reading
-
Three essentials for an effective mobile app strategy
With mobile apps invading the enterprise, it's time to develop a strategy using a set of universal app development tools. Continue Reading
Apple Device Enrollment Program (DEP)
The Apple Device Enrollment Program (DEP) is an online service that automates the enrollment and configuration of Apple iOS devices in an organization’s mobile device management software. Continue Reading
mobile productivity app (mobile productivity application)
A mobile productivity app is a software program that allows smartphone, tablet and wearable device users to perform essential day-to-day tasks.Continue Reading
NANDroid backup
NANDroid backups are typically created by Android device owners who have gained root access to their phone’s operating system in order to use aftermarket distributions of the Android OS.Continue Reading
virtual mobile infrastructure (VMI)
Virtual mobile infrastructure (VMI) is a delivery platform which does not require an application or operating system (OS) to run locally on a mobile device.Continue Reading
What are the best ways to use tablets for business?
As more enterprises begin to support tablets, many users find that the screen size and portability provides the right balance for common work-related tasks such as note taking.Continue Reading
Android device management: Everything you need to know in one guide
The Google Android mobile operating system runs on a wide variety of devices. Learn how IT can manage and secure such a diverse OS in the enterprise.Continue Reading
-
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys.Continue Reading
Setting standards for in-house app development and delivery
As with anything, mobile application development goes best when IT comes in with a well-thought-out plan. Learn how to optimize your app dev and delivery process.Continue Reading
Android for Work
Android for Work is a program for devices running on the Google Android mobile operating system that allows IT to manage and secure business applications on a work-specific profile.Continue Reading
Get to know Android for Work profiles and productivity features
Now that Android for Work is out, we dig into the features of the program’s work profiles and productivity apps.Continue Reading
What's new in Windows 10? Test your knowledge of the new OS
Microsoft has previewed several new mobility features in Windows 10, from a universal OS to better interactions on 2-in-1 devices. See if you've been paying close attention.Continue Reading
Apple Device Enrollment Program streamlines deployment, MDM
The Apple Device Enrollment Program allows IT pros to automate deployment, and they can also preset mandatory MDM configurations out of the box.Continue Reading
Rooted Android device risks include network access, data theft
Rooting an Android smartphone or tablet makes the device more vulnerable to malicious apps that could wreak havoc on a corporate network. MDM alone can't stop the threat.Continue Reading
How Box integration works with other enterprise apps
To get the most out of Box, use its APIs to integrate your enterprise applications with its cloud storage platform.Continue Reading
Pros and cons of using secure containers for mobile device security
With BYOD on the rise, IT needs to keep sensitive corporate information safe. Secure containers are one way to do that, but when’s best to use them?Continue Reading
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use.Continue Reading
distributed antenna system (DAS)
A distributed antenna system (DAS) is a way to deal with isolated spots of poor coverage inside a large building by installing a network of relatively small antennas throughout the building to serve as repeaters.Continue Reading
Everything you need to know about developing mobile apps
Developing mobile apps for your users can help them be more productive, but before you start building apps, learn about the different kinds.Continue Reading
Dual-persona technology: What it is and how it works
Dual-persona technology is still new, so IT pros want to know how it works and what the drawbacks are. Check out this FAQ for those answers and more.Continue Reading
BYOD challenges and advantages: Test your knowledge
Like many things in IT, there are BYOD challenges and advantages. Take this quiz and see how much you know about the pros and cons.Continue Reading
Mobile application delivery: How to do it and what to beware of
Mobile application delivery is a tough nut to crack. Every delivery option has drawbacks, such as cost, connectivity and user experience.Continue Reading
LTE-Advanced (Long Term Evolution-Advanced)
Long Term Evolution-Advanced (LTE-Advanced) is a cellular networking standard that offers higher throughput than its predecessor, the Long Term Evolution (LTE) standard.Continue Reading
app store (application store)
An app store (application store) is an online portal through which software programs are made available for procurement and download.Continue Reading
How personal email and the cloud are changing corporate email access
Employees' cloud and personal email accounts help them get work done, but email forwarding and cloud integration could make work tougher for IT.Continue Reading
Android device and security quiz
Despite their reputation for shoddy security, different Android devices and versions offer security and management features for IT. Test your Android knowledge.Continue Reading
Business cloud storage and file-sharing quiz
Test your knowledge of business cloud storage services and how to pick the right one for your company in this eight-question quiz.Continue Reading
mobile printing
Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.Continue Reading
Mobile data security quiz: Test your knowledge
Data security approaches have changed since workers have become more mobile. Take this quiz to see how much you know about keeping mobile data safe.Continue Reading
What, why and how: An enterprise MDM quiz
Many companies struggle to manage workers' devices. Have you tried MDM? See how much you know about enterprise MDM before implementing a system.Continue Reading
Nexus
Nexus is a series of smartphones and tablets manufactured by Google and its hardware partners. Nexus devices run the native Android operating system.Continue Reading
app wrapping (application wrapping)
App wrapping is the process of applying a management layer to a mobile app without requiring any changes to the underlying application.Continue Reading
sideloading
Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.Continue Reading
iPhone Configuration Utility
The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.Continue Reading
Wi-Fi range extender (range expander)
A Wi-Fi range extender, sometimes called a range expander, is a type of wireless repeater used to expand the reach of a wireless LAN. The device is situated in between a base router or access point and a client that is not close enough to receive ...Continue Reading
app
App is an abbreviated form of the word "application." An application is a software program.Continue Reading
Android Open Source Project (AOSP)
The Android Open Source Project (AOSP) is an initiative created to guide development of the Android mobile platform.Continue Reading
Quiz: Managing mobile devices in a health care setting
As smartphones and tablet PCs make their way into health care organizations, IT departments face many challenges. Take this quiz to see what you know about managing mobile devices.Continue Reading
fixed-mobile convergence (FMC)
Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks... (Continued)Continue Reading
RMON (Remote Network Monitoring)
RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central ...Continue Reading
real-time location system (RTLS)
A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.Continue Reading
camcorder (camera recorder)
A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.Continue Reading
geostationary satellite
A geostationary satellite is an earth-orbiting satellite, placed at an altitude of approximately 35,800 kilometers (22,300 miles) directly over the equator, that revolves in the same direction the earth rotates (west to east)...Continue Reading
wireless charging
Wireless charging is any of several methods of charging batteries without the use of cables. The three main methods of wireless charging are radio charging, resonance charging and inductive charging... (Continued)Continue Reading
resonance charging
Resonance charging is a wireless charging method for items that require large amounts of power, such as an electric car, robot, vacuum cleaner or laptop computer. The method works over small distances (3-5 meters)... (Continued)Continue Reading
Opera
Opera is a Web browser that provides some advantages over the two most popular browsers from Netscape and Microsoft...(Continued)Continue Reading
Web texting
Web texting is two-way text messaging from the Web to a handheld mobile device, usually a cellular phone.Continue Reading
SMS gateway
An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway. An SMS gateway can also serve as an international gateway for users with roaming capability, allowing SMS ...Continue Reading
common short code (CSC)
Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones. Common short codes may also be called mobile short codes or short numbers... (Continued)Continue Reading
SMS spam (cell phone spam or short messaging service spam)
SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly rare in North America, but has been common in Japan for years. In 2001-2002...Continue Reading
notebook computer
A notebook computer is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings.Continue Reading
forward error correction (FEC)
Forward error correction (FEC) is a method of obtaining error control in data transmission in which the source (transmitter) sends redundant data and the destination (receiver) recognizes only the portion of the data that contains no apparent errors.Continue Reading
downlink and uplink
These terms should not be confused with downstream and upstream.Continue Reading
wireless ISP (wireless Internet service provider or WISP)
A wireless Internet service provider (WISP) is an Internet service provider (ISP) that allows subscribers to connect to a server at designated hot spots (access points) using a wireless connection such as Wi-Fi.Continue Reading
unlocked cell phone
An unlocked cell phone is a cellular telephone handset that can be used with more than one service provider, making it easy for a user to switch from one cellular network to another... (Continued)Continue Reading
802.11
802.11 is an evolving family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE)....(Continued)Continue Reading
hertz
Hertz is a unit of frequency (of change in state or cycle in a sound wave, alternating current, or other cyclical waveform) of one cycle per second.Continue Reading