Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
Comparing mobile development in iOS vs. Android
When an organization builds a mobile app, many decisions come down to Android vs. iOS. The right approach can minimize development costs and support a positive user experience. Continue Reading
Android OS
Android OS is a Linux-based mobile operating system that primarily runs on smartphones and tablets. Continue Reading
What is an SSID (service set identifier)?
An SSID (service set identifier) is a sequence of characters that uniquely names a Wi-Fi network. An SSID is sometimes referred to as a network name. Continue Reading
-
How to implement a mobile device management project plan
With mobile device management software, IT can better support corporate smartphones, laptops and other mobile endpoints. Learn how to build a project plan for MDM implementation. Continue Reading
Apple Watch
Apple Watch is a wearable smartwatch that allows users to accomplish a variety of tasks, including making phone calls, sending text messages and reading email. Continue Reading
iPhone
The iPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.Continue Reading
What is a personal area network (PAN)?
A personal area network (PAN) is a small network that interconnects technology devices within a limited range of just a few meters.Continue Reading
What is LDAP (Lightweight Directory Access Protocol)?
LDAP (Lightweight Directory Access Protocol) is a software protocol used for locating data about organizations, individuals and other resources, such as files and devices, on public and corporate networks.Continue Reading
What is geolocation? Explaining how geolocation data works
Geolocation technology identifies physical locations of devices and individuals based on information such as geographic coordinates and internet protocol addresses (IP address).Continue Reading
How to conduct a mobile app security audit
To keep corporate and user data safe, IT must continuously ensure mobile app security. Mobile application security audits are a helpful tool to stay on top of data protection.Continue Reading
-
Can you accept credit card payments on an Android phone?
Many consumers prefer contactless payments, and vendors can easily enable them with a smartphone and the right software. Learn how to set up an Android to accept customer payments.Continue Reading
Set up Tap to Pay: How to accept payments with an iPhone
Tap to Pay makes it possible to accept customer payments from an iPhone with no additional hardware. Find out the best use cases for Tap to Pay and how to implement it.Continue Reading
How to set up Android Enterprise with EMM token registration
Android Enterprise can simplify Android management, but the wrong device enrollment method can complicate IT's job. Understand the pros and cons of EMM token registration.Continue Reading
How to set up Android Enterprise with zero-touch enrollment
For organizations that value convenience and UX, zero touch could be an ideal Android Enterprise enrollment method. Learn about the advantages and challenges it can present.Continue Reading
Siri
Siri is Apple's virtual assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).Continue Reading
How to choose an Android Enterprise enrollment method
When setting up Android Enterprise devices, there are several enrollment methods IT should consider. Admins should learn how to determine which method, or methods, to use.Continue Reading
Apple iOS
Apple iOS is a proprietary mobile operating system that runs on mobile devices such as the iPhone and iPad.Continue Reading
Bluetooth
Bluetooth is a telecommunications industry specification that describes how mobile devices, computers and other endpoints can easily communicate with each other using a short-range wireless connection.Continue Reading
Global Positioning System (GPS)
The Global Positioning System (GPS) is a 'constellation' of 31 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location.Continue Reading
iPad
The iPad is a touchscreen tablet PC made by Apple.Continue Reading
personal digital assistant (PDA)
A personal digital assistant (PDA) is a small, mobile, handheld device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedules, calendars and address book information handy.Continue Reading
What is the Rabbit R1, and what can it offer the enterprise?
Is an AI-powered device the next step in AI development, or a marketing gimmick? IT must explore whether the Rabbit R1 and its operating system offer real business benefits.Continue Reading
How to deploy Intune compliance policies for iOS and iPadOS
Compliance policies are a significant part of IT's device management, so admins should learn about Intune's compliance management features for all types of devices.Continue Reading
4G (fourth-generation wireless)
4G is the short name for fourth-generation wireless, the stage of broadband mobile communications that supersedes 3G (third-generation wireless) and is the predecessor of 5G (fifth-generation wireless).Continue Reading
GPRS (General Packet Radio Service)
GPRS (General Packet Radio Service) is a best-effort packet-switching protocol and standard for wireless and cellular network communication services.Continue Reading
Simplify mobile app development for the enterprise
Without the right resources, mobile app development can be challenging. Find out how to start the process and the best tools to streamline the app dev journey.Continue Reading
7 mobile device security best practices for businesses
Organizations can't deploy mobile devices without accounting for their security. IT admins should follow these seven best practices to manage mobile device and data security.Continue Reading
What fees come with accepting Apple Pay for businesses?
Apple Pay simplifies checkout for customers, but setup isn't always as straightforward. IT admins can review the costs to decide if Apple Pay makes sense for their organization.Continue Reading
Samsung Galaxy
Samsung Galaxy is a product line of Android smartphones, tablets and internet of things devices manufactured by Samsung Electronics.Continue Reading
How do personal hotspots work for remote work?
A personal hotspot can be a valuable element of a remote work strategy, but IT teams must understand how they work and what management challenges they present.Continue Reading
How to recycle mobile phones in the enterprise
Mobile device disposal requires careful planning. IT teams must learn how to recycle mobile phones to keep e-waste out of landfills and enterprise data out of the wrong hands.Continue Reading
Apple 3D Touch
Apple 3D Touch was a hardware-based feature Apple introduced in iPhone 6s and 6s Plus devices running iOS 9 that perceives the amount of force a user puts on the touchscreen to activate different functions.Continue Reading
iOS software development kit (iOS SDK)
The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple's mobile operating system (OS).Continue Reading
unlocked cell phone
An unlocked cell phone is a cellular telephone that can be used with more than one service provider, allowing a user the flexibility to switch between different networks.Continue Reading
Apple Automated Device Enrollment
The Apple Automated Device Enrollment program, formerly known as the Device Enrollment Program (DEP), is a device enrollment service that's included with Apple Business Manager (ABM) and Apple School Manager (ASM).Continue Reading
tablet (tablet PC)
A tablet is a wireless, portable personal computer with a touchscreen interface.Continue Reading
distributed antenna system (DAS)
In a distributed antenna system (DAS), a single signal source is connected to a group of antennas instead of to a single antenna.Continue Reading
app wrapping (application wrapping)
App wrapping (application wrapping) is applying a management layer to an existing mobile app. It is typically done by an organization using third-party tools. App wrapping is done to increase an app's security, manageability and analytics.Continue Reading
wearable technology
Wearable technology is any kind of electronic device designed to be worn on the user's body.Continue Reading
Wi-Fi (802.11x standard)
Wi-Fi is a term for certain types of wireless local area networks (WLAN) that use specifications in the IEEE 802.11 family of standards.Continue Reading
How to use Managed Google Play with Microsoft Intune
IT teams can connect their Managed Google Play accounts to Intune to get the best of both management tools. Integrate the two for easier Android Enterprise enrollment and more.Continue Reading
app
'App' is an abbreviated form of the word 'application.' An application is a software program that's designed to perform a specific function directly for the user or, in some cases, for another software program.Continue Reading
What are the steps to set up a Managed Google Play account?
Android administrators can use Managed Google Play to deploy enterprise apps, configure permissions and more. Learn how to get started with a Managed Google Play account.Continue Reading
What is Managed Google Play and how should IT teams use it?
One of Android Enterprise's significant components is Managed Google Play. IT should understand how the platform can aid app management, as well as what its limitations are.Continue Reading
Android Open Source Project (AOSP)
The Android Open Source Project (AOSP) is the repository of source code and the foundation which maintains it that is responsible for the core of the Android operating system.Continue Reading
sideloading
Sideloading is the installation of an application on a mobile device without using the device's official application distribution method.Continue Reading
FaceTime
FaceTime is a proprietary video and audio calling service developed by Apple Inc., primarily used on iOS, iPadOS and macOS devices.Continue Reading
Wi-Fi range extender (range expander)
A Wi-Fi range extender is a network device used to increase the effective range of a wireless network.Continue Reading
forward error correction (FEC)
Forward error correction (FEC) is a method for obtaining error control in data transmission in which the source (transmitter) sends redundant data and the destination (receiver) recognizes only the portion of the data that contains no apparent ...Continue Reading
802.11
802.11 is a family of evolving specifications for wireless local area networks (WLANs) developed and maintained by a working group of IEEE.Continue Reading
notebook computer
A notebook computer is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces, such as airplanes, libraries, temporary offices and meetings.Continue Reading
wireless ISP (wireless Internet service provider or WISP)
A wireless internet service provider (WISP) is an internet service provider (ISP) that allows subscribers to connect to the internet at designated hot spots or access points using a wireless connection such as Wi-Fi.Continue Reading
hertz (Hz)
Hertz (Hz) is the standard unit of frequency in the International System of Units (SI).Continue Reading
uplink and downlink
In satellite telecommunication, a downlink is the link from a satellite down to one or more ground stations or receivers, and an uplink is the link from a ground station up to a satellite.Continue Reading
Google Play
Google Play, formerly known as Android Market, is the official online store for digital media distributed by Google.Continue Reading
geostationary satellite
A geostationary satellite is an Earth-orbiting satellite placed at an altitude of approximately 22,300 miles or 35,800 kilometers directly above the equator.Continue Reading
iCloud
Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.Continue Reading
end-user computing (EUC)
End-user computing (EUC) is a term that refers to the technologies that IT professionals use to deploy, manage and secure the devices, applications and data that workers require to perform their jobs.Continue Reading
Google Firebase
Google Firebase is a set of cloud-based development tools that helps mobile app developers build, deploy and scale their apps.Continue Reading
remote wipe
Remote wipe is a security feature that allows a network administrator or device owner to send a command that remotely deletes data from a computing device.Continue Reading
How to exit kiosk mode on any OS
Manually exiting kiosk mode is still necessary in the age of mobile device management for convenience and when it's time to remove kiosks at their end of life.Continue Reading
telecommuting
Telecommuting allows an employee to complete work assignments from outside the traditional workplace using telecommunications tools such as email, phone, chat and video apps.Continue Reading
Apple watchOS (Apple Watch operating system)
Apple watchOS is the operating system (OS) designed specifically for the Apple Watch wearable device, with features that take advantage of the smaller screen and location of the device on the user's wrist.Continue Reading
mobile workforce management (MWM)
Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.Continue Reading
cross-platform mobile development
Cross-platform mobile development is an approach to developing software applications that are compatible with multiple mobile operating systems (OSes) or platforms.Continue Reading
mobile application development platform (MADP)
A mobile application development platform (MADP) is a type of software that allows a business to rapidly build, test and deploy mobile apps for smartphones or tablets.Continue Reading
smishing (SMS phishing)
Smishing -- or Short Message Service (SMS) phishing -- is a social engineering tactic cybercriminals use to trick people into divulging sensitive information over text messages.Continue Reading
enterprise mobility
Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.Continue Reading
Getting started with kiosk mode for the enterprise
A kiosk can serve several purposes as a dedicated endpoint. Understanding those possibilities and their benefits and challenges is key to deploying kiosk mode for the enterprise.Continue Reading
text messaging (texting or wireless messaging)
Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.Continue Reading
smartphone
A smartphone is a cellular telephone with an integrated computer and other features not originally associated with telephones, such as an operating system (OS), web browsing and the ability to run software applications.Continue Reading
How to detect and remove malware from an Android device
Mobile malware can come in many forms, but users might not know how to identify it. Understand the signs of malware on mobile devices, as well as what to do to remove the threat.Continue Reading
Active Directory Federation Services (AD FS)
Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall.Continue Reading
Google Drive
Google Drive is a cloud-based storage service that enables users to store and access files online.Continue Reading
mobile UI (mobile user interface)
A mobile UI (mobile user interface) is the graphical and usually touch-sensitive display on a mobile device, such as a smartphone or tablet, that allows the user to interact with the device's apps, features, content and functions.Continue Reading
CYOD (choose your own device)
CYOD (choose your own device) is an employee provisioning model in which an organization allows people to select the mobile devices they would like, usually from a limited number of options.Continue Reading
Google Android 4.4 KitKat
Android 4.4 KitKat is a version of Google's operating system (OS) for smartphones and tablets.Continue Reading
iPad Air
Apple's iPad Air is a tablet that is lighter and thinner than Apple's previous tablets.Continue Reading
war driving (access point mapping)
War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks (WLANs) while driving around a city or elsewhere.Continue Reading
Snapchat
Snapchat is a mobile app that allows users to send and receive "self-destructing" photos and videos. Photos and videos taken with the app are called snaps.Continue Reading
HTML5 mobile app
An HTML5 mobile app is a web application developed with version 5 of HTML, a web content standard designed for handheld devices like smartphones and tablets.Continue Reading
Temporal Key Integrity Protocol (TKIP)
Temporal Key Integrity Protocol (TKIP) is an encryption protocol included in the Institute of Electrical and Electronics Engineers (IEEE) 802.11i standard for wireless local area networks (WLANs).Continue Reading
enterprise mobility management (EMM)
Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.Continue Reading
How to create a mobile device management policy for your org
A mobile device management policy creates several essential benefits for an organization, like security measures and data and application guidelines for corporate information.Continue Reading
Apple AirDrop
Apple AirDrop is a native feature in iOS and macOS that lets users share data from one device to another on the same Wi-Fi network.Continue Reading
Apple Bonjour
Apple Bonjour is a group of networking technologies designed to help devices and applications discover each other on the same network.Continue Reading
captive portal
A captive portal is a webpage that the user of a public-access network is required to view and interact with before they can access the network.Continue Reading
bluesnarfing
Bluesnarfing is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection.Continue Reading
How to use the iPadOS file manager in the enterprise
Organizations can use the iPadOS Files app to manage files locally or in the cloud. Learn the pros and cons of both storage types and how to use them in the native file manager.Continue Reading
wireless distribution system (WDS)
A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN) without requiring that they connect through a wired backbone.Continue Reading
wireless broadband (WiBB)
Wireless broadband (WiBB) is high-speed internet and data service delivered through a wireless local area network (WLAN) or wireless wide area network (WWAN).Continue Reading
LTE (Long-Term Evolution)
LTE (Long-Term Evolution) is a fourth-generation (4G) wireless standard that provides increased network capacity and speed for cellphones and other cellular devices compared with third-generation (3G) technology.Continue Reading
802.11n
802.11n is an IEEE standard for wireless networking that boosts the speed, dependability and range of wireless transmissions in wireless local area networks (WLANs).Continue Reading
What are the best file managers for Mac devices?
If the native macOS file manager is lacking, IT can look to third-party options for advanced features. Commander One, ForkLift and Path Finder are three alternatives to consider.Continue Reading
mobile operating system
A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.Continue Reading
mobile device management (MDM)
Mobile device management (MDM) software allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.Continue Reading
How to ensure iPhone configuration profiles are safe
Configuration profiles make it easier to manage BYOD iPhones, but they're also associated with malware. Mobile security policies can ensure configuration profiles are safe.Continue Reading
laptop
A laptop, sometimes called a notebook computer by manufacturers, is a battery- or AC-powered personal computer (PC) smaller than a briefcase.Continue Reading
antenna
An antenna is a specialized transducer that converts electric current into electromagnetic (EM) waves or vice versa.Continue Reading
instant app (Google Android instant app)
A Google Android instant app is a small software program that enables users to test out a portion of a native Android app without installing it on a device.Continue Reading