Application modernization and mobile app delivery
Application modernization is a necessity in the mobile era, because traditional enterprise applications don't always fit well on smartphones and tablets. The resouces in this section explain how to use mobile app delivery technologies, such as desktop and application virtualization, to bring legacy apps to mobile devices. Other topics include application refactoring, which makes legacy apps more user-friendly on smartphones and tablets.
Top Stories
-
News
18 Nov 2021
Apple launches SMB device management
Designed for companies of up to 500 employees, Business Essentials offers tools to download apps and push updates to iPhones, iPads and Macs. It provides up to 2 TB iCloud storage. Continue Reading
-
News
17 Mar 2021
IBM tools speed mainframe application modernization projects
IBM has released new versions of its application modernization tools designed to bring its Z series of mainframe applications in closer alignment with its development pipeline. Continue Reading
-
Tip
07 Jun 2012
Android versus iOS security: Features, policies and controls
There’s not a clear winner when it comes to Android versus iOS security, but with iOS’ app security in one corner and Android’s encryption in the other, it makes for a good fight. Continue Reading
-
Photo Story
10 May 2012
Top 10 disruptive technology vendors in the enterprise
Technology evolves so quickly that it’s getting harder and harder for IT to keep up. These disruptive technology vendors lead the charge. Continue Reading
-
Tip
13 Apr 2012
How an acceptable use policy and app control can improve BYOD success
Organizations that adopt BYOD should have an acceptable use policy to help with security and app control. When users know expectations and consequences, BYOD gets easier for IT. Continue Reading
-
Tip
22 Mar 2012
Business email security and the risks of personal Gmail forwarding
Business email security might not be on employees’ minds when they forward corporate mail to more user-friendly Gmail accounts, so IT should take steps to protect corporate data. Continue Reading
-
Tip
21 Oct 2011
Configuration profiles: An iPad administrator's best friend
The influx of iPads and other mobile devices into the enterprise may worry IT administrators, but configuration profiles allow for centralized management of iOS devices. Continue Reading
-
Tip
01 Sep 2011
Creating a fluid mobile platform strategy to manage mobile diversity
A fluid mobile platform strategy helps enterprises manage the growing diversity of smart devices including tablets. Continue Reading
-
Tutorial
15 Jul 2011
Bringing BYOD to your enterprise
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed. Continue Reading
-
Tip
14 Jul 2011
Meeting technical requirements for mobile health care deployments
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security. Continue Reading
-
Tip
27 Jun 2011
Mobile device strategy bypassed as enterprises face tablet invasion
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis. Continue Reading
-
News
13 Jun 2011
Mobile device security demands surpass reality, survey says
It's no surprise that mobile device security was top of mind in our recent reader survey. Find out what's missing and what IT pros are asking for in mobile security products. Continue Reading
-
News
07 Jun 2011
Tablet growth in the enterprise ready to erupt
IT pros are planning on significant tablet growth as part of their IT strategy, according to our reader survey. But will tablets ever replace laptops and desktops? Continue Reading
-
News
03 Jun 2011
Mobile growth hinges on applications and operating systems, survey finds
Mobile growth is surging ahead like never before, according to our annual reader survey. Find out what your peers are saying, and where their IT budgets are going. Continue Reading
-
Tip
12 Apr 2011
Does a mobile VDI platform make sense for your users?
Mobile VDI isn't always a good fit. Ask these five questions to determine whether a mobile VDI platform makes sense for your users. Continue Reading
-
Tip
29 Mar 2011
Security tools that can boost Windows mobile security
While mobile device security isn't easy or cheap, in today's smartphone-ridden enterprise, it's a necessity. Secure your Windows endpoints with these tools. Continue Reading
-
Quiz
24 Mar 2011
Quiz: Managing mobile devices in a health care setting
As smartphones and tablet PCs make their way into health care organizations, IT departments face many challenges. Take this quiz to see what you know about managing mobile devices. Continue Reading
-
Feature
22 Mar 2011
Cius vs. iPad: Can Cisco take on Apple?
The battle for the enterprise tablet may boil down to Cisco vs. Apple and Cius vs. iPad. However, Fast Packet blogger, Greg Ferro wonders if Cisco really has the engineering and apps to win. Continue Reading
-
Answer
28 Feb 2011
Can smartphones get viruses and spread them to the network?
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it. Continue Reading
-
Tip
28 Feb 2011
Mobile patching is No. 1 challenge of mobile device security
Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security. Continue Reading
-
Tip
24 Feb 2011
Accessing mobile unified communications with virtual desktops
Running virtual desktops for mobile unified communications provides users across many platforms access to the same UC apps available on their laptops or desktops. Learn about the benefits and challenges of integrating virtual desktops, unified communications and mobile devices. Continue Reading
-
News
21 Feb 2011
Tablet security calls for mobile policy, controlling mobile apps
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down. Continue Reading
-
Tip
06 Oct 2010
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network eavesdropping and spoofing. Continue Reading
-
Tip
03 Feb 2010
Mobile client security threats shouldn't be underestimated
Malware authors haven't overlooked mobile devices, whose growing computing power now poses an inviting target. Be aware of dangers from viruses and accidental data disclosure. Continue Reading
-
Tip
18 Jan 2010
Mobile device integration services: Choosing a mobile operating system
To offer mobile device integration services, a solution provider must be able to recommend the right operating system for mobile devices. Depending on a customer's needs, a solution provider should be able to provide a mobile OS comparison and guide the customer toward the right mobile operating system. Continue Reading
- News 15 Jan 2010
-
Tip
16 Jun 2009
Mobile Device Manager joins Windows domains to mobile devices
Microsoft's Mobile Device Manager gives IT managers better tools and added network support to improve management of devices that run Windows Mobile 6.1. Continue Reading
-
Tutorial
14 Aug 2008
WiMAX tutorial
As the WiMAX industry has grown, so has WiMAX hype and confusion. Mobility managers and decision makers have to sort through the hype to facilitate their knowledge and understanding of WiMAX technology. SearchMobileComputing.com asked Paul DeBeasi, senior analyst at the Burton Group, to set the stage for a broad overview of what WiMAX is and how it works. DeBeasi's begins this tutorial by introducing WiMAX technology, applications and terminology. Further sections discuss WiMAX services, performance, security and devices. Continue Reading
-
Tip
01 Aug 2008
WiMAX devices
WiMAX devices will become more readily available as carriers deploy widespread WiMAX service. Continue Reading
-
Tutorial
01 Jul 2008
A strategic approach to enabling mobile business applications
Today's successful enterprises are discovering that granting mobile access to critical business applications can increase productivity and revenue. This guide will cover how to develop an overall strategy for mobilizing applications and how to tailor that to your specific needs. Learn about the most common roadblocks and how to devise a plan that will avoid problems in your applications rollout. Continue Reading
-
Feature
16 Jun 2008
Detecting rogue mobile devices on your network
Controlling what mobile devices connect to your network is crucial, whether those devices are local or remote, stationary or mobile. Many enterprises use application portals, mail servers and/or VPN gateways to detect and restrict mobile access, complemented by IPS to spot anything that slips through the cracks. Such techniques can be effective, but today's mobile devices can present new challenges that deserve further attention. Lisa Phifer discusses the challenges being introduced by today's increasingly diverse mobile devices and discusses some emerging techniques to deal with them. Continue Reading
-
Feature
28 May 2008
Mobile security policies
Mobile security policies are necessary for a safe mobile environment. In this series you'll discover three key elements that are essential to your mobile security policy and learn how government regulations affect what is required in your policy. Continue Reading
-
Quiz
15 Apr 2008
Quiz: Mobile Device Security -- Who else can hear me now?
Mobile device security and compliance regulations can be as hard to pin down as a strong connection for your smartphone. Test your knowledge of risk areas and compliance rules in this quiz from WhatIs.com. Continue Reading
-
Tip
07 Mar 2008
700 MHz -- Why is it so valuable?
The 700 MHz wireless spectrum auction is causing a lot of excitement, yet the reasons why can be obscure -- Paul DeBeasi explains its importance and how it works. Continue Reading
-
Tip
24 Sep 2007
Mobile service providers: How to choose the right one
Finding the "right" mobile service provider might be an abstract, theoretical concept, but picking the right one for your organization shouldn't be too difficult. Here, Craig Mathias outlines some key elements to guide you in selecting the right mobile service provider. Continue Reading
-
Tip
17 Jul 2007
iPhone in the enterprise: Can it replace a BlackBerry?
How will the iPhone fit in the enterprise? We challenged our expert to put the iPhone through a series of tests to see how well it integrates, whether it's manageable, and whether its email, calendar and contact features can replace a BlackBerry. Continue Reading
-
Tip
21 May 2007
Mobile data services -- A checklist of considerations
Analyzing and selecting a mobile data service can be a daunting task. This tip provides a checklist of the major factors to consider when evaluating mobile data services (GSM, CDMA and WiMAX). Continue Reading
-
Tip
29 Jan 2007
Defining mobility solutions
Mobile solutions fall into one of three distinct philosophical categories and the solution you apply to your enterprise depends to some extent on the particular mobility needs of those involved. Craig Mathias explores three desktop replacement scenarios for your ever-increasing mobile workforce. Continue Reading
-
Report
30 Nov 2006
Mobile operating systems: Which mobile device platform fits your strategy?
Mobile operating systems (OS) and mobile device platforms can be confusing for mobile managers. These unbiased stories aim to help you choose the platform that's right for your company. Continue Reading
-
Tutorial
26 Jun 2006
3G overview
This 3G overview describes the many benefits of 3G wireless technologies. Continue Reading