Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
Android Oreo
Android 8.0 Oreo is the eighth major update to the Android operating system that contains new features and enhancements for application developers. Continue Reading
How to remove a management profile from an iPhone
User Enrollment creates a management profile for BYOD iPhones, but IT must remove that data in cases such as device loss or theft. Learn how to do this with a selective wipe. Continue Reading
mobile malware
Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches. Continue Reading
-
mobile application management (MAM)
Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets. Continue Reading
How to restore a deleted Android work profile
If a user deletes an Android work profile or switches devices, they will need to go through the process to restore it. Learn the simple steps to reenroll an Android work profile here. Continue Reading
Does Apple offer work profiles for iPhones?
Apple uses data and device containerization -- instead of the Android Work Profile model -- to split work and personal information on iPhones and support BYOD deployments.Continue Reading
How to delete or disable an Android work profile
When users leave an organization or lose a device, it's time to remove their Android work profile. Learn three methods to get rid of a work profile on a BYOD device.Continue Reading
Google Mobile Services (GMS)
Google Mobile Services (GMS) is a collection of applications and application programming interfaces (APIs) developed by Google for manufacturers of Android devices, such as smartphones and tablets.Continue Reading
push notification
Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.Continue Reading
Android Studio
Android Studio is the official integrated development environment (IDE) for Android application development.Continue Reading
-
How does Android 13 work profile improve IT management
When users bring personal Android devices to the workplace, IT should consider using work profiles on these devices. Learn about the latest work profile features on Android 13.Continue Reading
Google Chrome browser
Google Chrome browser is a free web browser used for accessing the internet and running web-based applications.Continue Reading
Multimedia Messaging Service (MMS)
Multimedia Messaging Service (MMS) is a communications technology developed by 3GPP (Third Generation Partnership Project) to enable the transmission of multimedia content via text message.Continue Reading
Microsoft OneDrive
OneDrive (formerly SkyDrive) is an online cloud storage service from Microsoft.Continue Reading
What is wireless communications? Everything you need to know
Wireless communications is the transmission of voice and data without cable or wires.Continue Reading
Google Hangouts
Google Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chats, either one-on-one or in a group.Continue Reading
SIM card
A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.Continue Reading
wireless access point
A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN), serving as the interconnection point between the WLAN and a fixed wire network.Continue Reading
OTA update (over-the-air update)
An over-the-air (OTA) update is the wireless delivery of new software, firmware or other data to mobile devices.Continue Reading
wireless backhaul
Wireless backhaul is the use of wireless communication systems to transport data between the internet and subnetworks.Continue Reading
Apple User Enrollment
Apple User Enrollment (UE) is a form of mobile device management (MDM) for Apple products that supports iOS 13 and macOS Catalina.Continue Reading
fixed wireless
Fixed wireless networking refers to the operation of wireless devices in fixed locations such as homes and offices.Continue Reading
tvOS
TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.Continue Reading
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a security standard for computing devices equipped with wireless internet connections.Continue Reading
Wireless Application Protocol (WAP)
Wireless Application Protocol (WAP) is a specification for a set of communication protocols to standardize the way wireless devices, such as mobile phones and radio transceivers, can be used for internet access, including email, the web, newsgroups ...Continue Reading
wireless ad hoc network (WANET)
A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless ...Continue Reading
enterprise file sync and share (EFSS)
Enterprise file sync and share (EFSS) is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.Continue Reading
file sharing
File sharing is the public or private sharing of files or folders on a networked computer.Continue Reading
WhatsApp
WhatsApp is a free cross-platform messaging service.Continue Reading
m-commerce (mobile commerce)
M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.Continue Reading
microblogging
Microblogging is a short blog post designed for quick and typically direct audience interactions.Continue Reading
How to perform a full remote wipe on an Android device
When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace.Continue Reading
How to create a mobile app for a small business
Regularly updated mobile applications are becoming essential for small businesses. The first step for SMBs is knowing all the options for building and maintaining mobile apps.Continue Reading
How to perform a remote wipe of Office 365 on a smartphone
Employees like having email and other Office 365 applications on their smartphones. There are security risks that come with mobile devices accessing corporate data, however.Continue Reading
mobile computing
Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.Continue Reading
How and when to set up Apple TV with a business account
While organizations can use a business Apple ID account, there are other options -- a personal Apple ID or even no Apple ID may suffice.Continue Reading
consumerization of IT
The consumerization of IT refers to how software and hardware products designed for personal use migrated into the enterprise and were used for work purposes.Continue Reading
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices.Continue Reading
RPC over HTTP
Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP.Continue Reading
mobile service provider
A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.Continue Reading
near-field communication (NFC)
Near-field communication (NFC) is a short-range wireless connectivity technology that uses magnetic field induction to enable communication between devices when they're touched together or brought within a few centimeters of each other.Continue Reading
device-agnostic (device agnosticism)
Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.Continue Reading
digital video broadcasting (DVB)
Digital video broadcasting (DVB) is a set of standards that define digital broadcasting using DVB satellite, cable and terrestrial broadcasting infrastructures.Continue Reading
Wireless Transport Layer Security (WTLS)
Wireless Transport Layer Security (WTLS) is a security level for the Wireless Application Protocol (WAP), specifically for the applications that use WAP.Continue Reading
electromagnetic interference (EMI)
Electromagnetic interference (EMI) is unwanted noise or interference in an electrical path or circuit caused by an outside source.Continue Reading
Short Message Service (SMS)
SMS (Short Message Service), commonly referred to as 'text messaging,' is a service for sending short messages of up to 160 characters (224 character limit if using a 5-bit mode) to mobile devices, including cellular phones, smartphones and tablets.Continue Reading
short message service center (SMSC)
The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.Continue Reading
HSDPA (High-Speed Downlink Packet Access)
High-Speed Downlink Packet Access (HSPDA) is a packet-based mobile telephony protocol used in 3G Universal Mobile Telecommunications Service (UMTS) radio networks to increase data capacity and speed up download rates.Continue Reading
unzipping
Unzipping is the act of extracting the files from a zipped single file or similar file archive.Continue Reading
application sandboxing
Application sandboxing, also called application containerization, is an approach to software development and management and mobile application management (MAM) that limits the environments in which certain code can execute.Continue Reading
Microsoft Store
The Microsoft Store -- formerly called the Windows Store -- is an online marketplace for consumers to buy and download a variety of items.Continue Reading
mobile platform as a service (mPaaS)
Mobile platform as a service (mPaaS) is a specialized type of PaaS designed to provide an integrated development environment (IDE), deployment platform, lifecycle management and analytics for mobile/web applications.Continue Reading
2D barcode (two-dimensional barcode)
A 2D (two-dimensional) barcode is a graphical image that stores information horizontally as one-dimensional barcodes do, as well as vertically.Continue Reading
When should you use Android Enterprise Essentials?
With the Android Enterprise Essentials program, organizations get simple and basic device management. However, this approach isn't a great fit for all organizations.Continue Reading
satellite
A satellite is any object that orbits something else, as, for example, the Earth orbits the sun.Continue Reading
Mobile application management tools balance service and cost
Finding the right mobile application management tool can be challenging. Discover whether it's best to choose a standalone MAM tool over an integrated EMM suite.Continue Reading
How to enroll iOS devices with Apple User Enrollment
A recently added Apple feature, iPadOS and iOS User Enrollment, helps organizations manage devices with personal data without sacrificing end users' privacy.Continue Reading
How to deploy a mobile threat defense app in 3 scenarios
The mobile threat defense integration and application deployment process differ depending on whether an organization uses MDM, MAM or neither.Continue Reading
COPE (corporate-owned, personally enabled)
COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or ...Continue Reading
Mobile Threat Defense (MTD)
Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.Continue Reading
spectrum efficiency
Spectrum efficiency describes the amount of data transmitted over a given spectrum or bandwidth with minimum transmission errors.Continue Reading
How to deploy configuration profiles on iOS 14 and later
While mobile IT admins can deploy iOS configuration profiles manually or ask users to handle that task, they should learn how to handle mass profile deployments as well.Continue Reading
GSM (Global System for Mobile communication)
GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.Continue Reading
MIMO (multiple input, multiple output)
MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).Continue Reading
New iOS 14 features that mobile admins should be excited for
With the impending release of iOS 14, mobile admins should learn the advancements that iOS 14 can offer and how the features can make a major difference in the enterprise.Continue Reading
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API.Continue Reading
How can IT manage Android Things devices in the enterprise?
The Android Things program provides APIs that link atypical Android devices to Android smartphone management tools, so mobile admins must learn to manage Android Things devices.Continue Reading
What Android security threats should IT know about?
Mobile admins must understand the nature of the most recent Android security threats so they can protect users, but it's crucial to know where these verified threats are listed.Continue Reading
Ownership scenario should dictate mobile device policies
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions.Continue Reading
New Apple MDM terms iOS admins should know
Apple introduced a new BYOD-friendly management mode for iOS and macOS and renamed the existing Apple MDM modes. Get up to speed with the three new terms.Continue Reading
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well.Continue Reading
Enterprise mobility management software offerings and use cases
IT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market.Continue Reading
Clear up the confusion about end-user computing
Today's end-user computing industry is the culmination of a decade of changes in mobility, desktops, virtualization and more. Dive in to what really qualifies as EUC.Continue Reading
Top 3 emerging mobile app development trends for 2019
These three emerging mobile app development strategies could change the way apps are developed in the future. Discover which of these methods is right for your organization.Continue Reading
Intro to iPhone encryption features for Apple admins
Encryption for iOS devices comes baked into the device itself, but iOS devices also have some significant enterprise-level protections that IT must enable and deploy policies for.Continue Reading
How the Intune App Wrapping Tool works for Android
Mobile application wrapping is an effective way to deploy policies that can't normally interact with an app. Learn how IT can use Intune's wrapping tool on Android apps.Continue Reading
Transition to Android Enterprise management before Android Q
With the upcoming deprecation of Device Admin APIs, IT should look at the possibility of migration to Android Enterprise, Google's endorsed API program, for device management.Continue Reading
Best smartphone for business use relies on many key factors
Operating systems and security protection are among the key considerations when companies select smartphones for business use. Learn more about device options and decision points.Continue Reading
Considerations for choosing enterprise mobility tools
Mobile device management may be long gone, but IT pros still have many options to enroll, secure and manage their organization's fleet of mobile devices. Discover what the options are.Continue Reading
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods.Continue Reading
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services.Continue Reading
The end of hybrid Intune MDM and what IT needs to know
Some Microsoft Intune admins are unsure of what to do after the death of Intune hybrid MDM. IT should consider Azure or other MDM platforms to maintain key functions.Continue Reading
Does enterprise file sync and share work on mobile devices?
Users who work with file sync-and-share apps on their mobile devices should be aware that auto-syncing works differently and that there are more security risks.Continue Reading
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work.Continue Reading
Mobile application developer skills to know for an interview
One of the best ways to succeed in your mobile app dev career is to master the art of the interview. Review need-to-know technical skills and how to communicate them effectively.Continue Reading
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape.Continue Reading
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices.Continue Reading
How can organizations implement mobile app personalization?
Organizations that want to boost user engagement on a mobile app should use personalization. They can follow these steps to implement personalization effectively.Continue Reading
Evernote mobile app helps fill productivity gaps
Taking and organizing notes is an important part of many employees' jobs. Evernote can help business users manage notes, which can be even more critical on mobile devices.Continue Reading
What are the benefits of QR code enrollment?
IT can enroll devices into MDM using a QR code, which is a more attainable option as support expands. Discover the benefits of this process, including improved workflow and ease of use.Continue Reading
The complete Apple iOS guide for IT administrators
Apple iOS has become a legitimate enterprise option. IT admins must know about its security capabilities and how to manage devices. Developers should also learn the ins and outs of iOS app development.Continue Reading
Stay updated on the Android Enterprise Recommended program
Google made a few updates to Android Enterprise Recommended. Explore recent offerings from the proprietary Android enterprise device program, including support for rugged devices.Continue Reading
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps.Continue Reading
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system.Continue Reading
Mobile app testing tools embrace automation, open source
Organizations should think about mobile app testing from the beginning. Discover other best practices from the CTO of Sauce Labs, a mobile app testing company.Continue Reading
What mobile device analytics can do for you
The hype around analytics is real. When it comes to mobile, this technology can help IT administrators glean more information about users, business processes and more.Continue Reading
Pros of dedicated API services for cross-platform mobile apps
One API can rule them all -- but developers shouldn't be surprised if problems occur. Delve into the pros and cons of dedicated API services for cross-platform apps.Continue Reading
What are the benefits of mobile app A/B testing?
Mobile app A/B testing is the best way to prevent buggy features from reaching your users. Learn the benefits and discover how to get started with the process.Continue Reading
Pros and cons of a low-code platform for mobile
Low-code platforms for mobile app development come with plenty of controversy. Discover why developers hate them and how organizations can use them to empower end users.Continue Reading
How to create an inclusive endpoint management strategy
Smartwatches, IoT devices and sensors -- oh my! Endpoint management can get confusing quickly, but you can figure it out by answering these questions.Continue Reading