Mobile OS News
March 09, 2018
XenMobile MAM now supports AppConfig Community standards, in addition to Citrix's proprietary MDX toolkit and Office 365 MAM through the Intune Graph API.
February 13, 2018
With more businesses expecting enterprise-grade mobile devices to last longer than the average consumer smartphone replacement cycle, keeping those devices secure is a growing challenge. According ...
January 09, 2018
Every company is now a software company, this much we know to be true. If we accept this new truism, then a camera company must be a software company… or at least it must be a digital camera ...
November 08, 2017
The latest security release from Google patched the Android KRACK vulnerability affecting Wi-Fi's WPA2 protocol, but update confusion leaves users unsure if they are safe.
Mobile OS Get Started
Bring yourself up to speed with our introductory content
Application testing is a necessity in the era of enterprise mobility. Define the right testing criteria and adopt the proper tools to build and deliver high-quality mobile apps. Continue Reading
Tablets and smartphones are a growing must-have for modern workers. Learn how you can sort through the vast array of options and determine the best vendors for your organization. Continue Reading
Make sure IoT software development efforts stay focused on the user throughout the process, and across the software stack. Continue Reading
Evaluate Mobile OS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
IT buyers must decide among tablets, smartphones or both to enhance worker productivity, as well as the usability, management and security level of the options available. Continue Reading
Applications built decades ago weren't meant for today's mobile workflows. That's why mobile application development platforms are evolving to take into account the data users need from those legacy systems. Developers can create micro apps, which serve single purposes and pull in information from back-end databases. This month's cover story explores the tools behind micro apps and how applications have evolved from the complex beasts they once were.
But as organizations turn their attention to micro apps for mobile devices, they must also consider offering unified workspaces to users across different endpoints and OSes. One columnist discusses this trend, while another provides some tips for eliminating common mobile strategy roadblocks. Also in this issue, expert Gabe Knuth gives an overview of user experience monitoring for virtual desktops. And the Device Spotlight shines on Lenovo's ThinkPad X270.Continue Reading
Google is using machine learning and peer group analysis to protect against malicious Android apps in the Google Play Store. Matt Pascucci explains how this works. Continue Reading
Manage Mobile OS
Learn to apply best practices and optimize your operations.
Mobile app developer tools can alleviate the confusion of mobile test projects. Here are five strategies to consider if you're in the midst of testing complications. Continue Reading
It's important for organizations to stay current on what's new in mobile malware and to develop security policies to combat these vulnerabilities. Continue Reading
Businesses use KPIs to measure performance and operational efficiency. When it comes to developing and delivering mobile apps to users, several metrics can help. Continue Reading
Problem Solve Mobile OS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Android for Work's sandboxing tools, which split work and personal profiles, can be bypassed with a proof-of-concept attack. Expert Michael Cobb explains how the attack works. Continue Reading
An Android backdoor was discovered in the Ragentek firmware used in almost three million low-cost devices. Expert Michael Cobb explains how to prevent attacks on affected devices. Continue Reading
New research on Android VPN apps revealed the extent of their privacy and security flaws. Expert Kevin Beaver explains how IT professionals can mitigate the risks. Continue Reading