Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
How virtual assistant technology will affect the enterprise
Mobile devices with AI and virtual assistants will affect the enterprise, as well as consumers. Learn how to prep your organization for the future. Continue Reading
How to implement tablets for enterprise use
To integrate tablets into the enterprise, IT needs to know more than just which tablet is the best fit. Discover the tools that can help IT enroll and maintain the new devices. Continue Reading
How Apple DEP works and why it's important
Apple's DEP was the groundbreaking template for the future of endpoint provisioning. The program helps businesses and educators simplify enrollment and management. Continue Reading
-
Unpack the role of Google's Flutter app dev framework
Google's new cross-platform framework, Flutter, could threaten Android's existence. Explore three theories about why the company developed its new tool. Continue Reading
Ruggedized devices face a mobile-fueled transition
The next generation of smartphones is more rugged than ever, and this trend will change the ruggedized device market. Learn how and know what to expect in the next few years. Continue Reading
-
Definitions to Get Started
- What is SMS (Short Message Service)?
- Android OS
- What is an SSID (service set identifier)?
- Apple Watch
- iPhone
- What is a personal area network (PAN)?
- What is LDAP (Lightweight Directory Access Protocol)?
- What is geolocation? Explaining how geolocation data works
Developers reap benefits of iOS app modules with Swift
Many developers recognize the benefits of app modularization. Historically, it's been difficult to begin the process, but now changes from Apple provide more opportunity.Continue Reading
Test your knowledge of mobile app programming languages
Do you know the difference between native, web-based and hybrid mobile apps? Test your knowledge of mobile app development and languages with this quiz.Continue Reading
On-device machine learning offers security, reduced latency
Where should IT process machine learning data? Mobile devices can now process machine learning, but it's important to evaluate all the options -- including the cloud.Continue Reading
Develop an IAM strategy for the mobile enterprise
As the role of IAM evolves, it's important to be aware of current and future technologies. IT teams should review their needs, as well as the pros and cons of IAM, before deciding.Continue Reading
Three questions to fuel a mobile app development project
It's not cheap to build a mobile app, so IT pros should do their research first. Here's how to determine the cost and discover which tools and trends your organization should adopt.Continue Reading
-
Mobility strategies shift toward UEM, IAM in 2018
IT is changing priorities when it comes to fitting mobile management into end-user computing strategies. Learn what some recent stats show about the new age of mobile.Continue Reading
What to know before implementing an IAM system
IT administrators have many features to choose from and requirements to meet when looking for an IAM tool. Check these boxes before committing to IAM.Continue Reading
How well do you know EMM platforms?
Enterprise mobility management is made up of many different facets, including MDM and MCM. Do you know the difference between them? Test your knowledge with this quiz.Continue Reading
How to track mobile app performance metrics
Developers that don't track mobile app health will get little insight into the user experience. Learn these effective strategies to track and understand mobile app performance metrics.Continue Reading
Pros and cons of AI for mobile IT
Mobile IT admins should be prepared to take advantage of artificial intelligence technologies, but it's important to be aware of the risks and challenges involved, as well.Continue Reading
How should IT handle app onboarding for employees?
When it comes to onboarding a mobile app for internal use, IT should make the process as easy as possible. Here are several strategies to help.Continue Reading
IT must prep for enterprise AI software
AI technology is growing fast, and end-user computing administrators need to be prepared for the multitude of benefits it can bring IT and employees.Continue Reading
Understand chatbot use cases and features for business
The bot that chattered with you over AOL Instant Messenger isn't too far off from the way chatbot technology can work in corporate mobile apps.Continue Reading
Explore the features of unified endpoint management
UEM can ease pain points for IT or it could create complications. To decide whether this is a good approach, IT pros should do their research.Continue Reading
Take a mobile-first approach to digital transformation
There's no denying it: Smartphones have changed everything, from personal life to business. Get on board with digital transformation.Continue Reading
Mobile is at the forefront of digital transformation trends
As 'digital transformation' dominates discussion, understand why it's important to keep mobile at the forefront of the initiative -- and what you can do to get started.Continue Reading
Explore the pros and cons of identity federation management
Identity federation is a relatively new technology in mobile, but it comes with challenges. Understand how to make deployment painless before adopting it.Continue Reading
Five steps to effective usability testing for mobile apps
To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it out. These tips can help perfect the process.Continue Reading
The new role of identity and authentication in the enterprise
It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills the need -- but you'll need to navigate it first.Continue Reading
How to approach mobile password management for the enterprise
When simple passwords no longer provide sufficient security, look to other options. Here are some ways to modernize password management for your enterprise.Continue Reading
Tighten mobile security for the enterprise with new strategies
It's important to update your organization's mobile security strategy. Stay informed with new security methods, such as biometric authentication and edge gateways.Continue Reading
A handy mobile app testing checklist for developers
Application testing is a necessity in the era of enterprise mobility. Define the right testing criteria and adopt the proper tools to build and deliver high-quality mobile apps.Continue Reading
Buy the right enterprise mobile devices for your workers
Tablets and smartphones are a growing must-have for modern workers. Learn how you can sort through the vast array of options and determine the best vendors for your organization.Continue Reading
How to choose the best identity access management software
Many IAM products flood today's market, with a variety of different features. Prioritize which capabilities are essential to the business before you make a final decision.Continue Reading
A mobile app security checklist for developers
When developing an app, security should be the number one priority. Review these tips for ensuring rock-solid security for your enterprise mobile app.Continue Reading
What are the biggest mobile device security threats?
As long as there are mobile devices, there will always be security risks for organizations to face. Four IT professionals share what they think the worst issues are today.Continue Reading
How IT can develop and deploy mobile apps
If IT's goal is to get enterprise mobile apps to employees, there are several ways to go about it. The top development and deployment approaches are popular for a reason.Continue Reading
VMware AirWatch
VMware AirWatch is an enterprise mobility software provider based in Atlanta. AirWatch, a division of virtualization vendor VMware, provides technologies that help IT administrators deploy, secure and manage mobile devices, applications and data, as...Continue Reading
An introduction to mobile application design
Mobile application design isn't always easy. An effective design keeps user experience at the forefront of the design process. Without that, an enterprise mobile app could fail.Continue Reading
Apple TV (Apple TV 4)
Apple TV is a set-top box that allows end users to stream multimedia content from the Internet over a television.Continue Reading
Three essentials for an effective mobile app strategy
With mobile apps invading the enterprise, it's time to develop a strategy using a set of universal app development tools.Continue Reading
What are the best ways to use tablets for business?
As more enterprises begin to support tablets, many users find that the screen size and portability provides the right balance for common work-related tasks such as note taking.Continue Reading
Android device management: Everything you need to know in one guide
The Google Android mobile operating system runs on a wide variety of devices. Learn how IT can manage and secure such a diverse OS in the enterprise.Continue Reading
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys.Continue Reading
Setting standards for in-house app development and delivery
As with anything, mobile application development goes best when IT comes in with a well-thought-out plan. Learn how to optimize your app dev and delivery process.Continue Reading
Get to know Android for Work profiles and productivity features
Now that Android for Work is out, we dig into the features of the program’s work profiles and productivity apps.Continue Reading
What's new in Windows 10? Test your knowledge of the new OS
Microsoft has previewed several new mobility features in Windows 10, from a universal OS to better interactions on 2-in-1 devices. See if you've been paying close attention.Continue Reading
Apple Device Enrollment Program streamlines deployment, MDM
The Apple Device Enrollment Program allows IT pros to automate deployment, and they can also preset mandatory MDM configurations out of the box.Continue Reading
Rooted Android device risks include network access, data theft
Rooting an Android smartphone or tablet makes the device more vulnerable to malicious apps that could wreak havoc on a corporate network. MDM alone can't stop the threat.Continue Reading
How Box integration works with other enterprise apps
To get the most out of Box, use its APIs to integrate your enterprise applications with its cloud storage platform.Continue Reading
Pros and cons of using secure containers for mobile device security
With BYOD on the rise, IT needs to keep sensitive corporate information safe. Secure containers are one way to do that, but when’s best to use them?Continue Reading
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use.Continue Reading
Everything you need to know about developing mobile apps
Developing mobile apps for your users can help them be more productive, but before you start building apps, learn about the different kinds.Continue Reading
Dual-persona technology: What it is and how it works
Dual-persona technology is still new, so IT pros want to know how it works and what the drawbacks are. Check out this FAQ for those answers and more.Continue Reading
BYOD challenges and advantages: Test your knowledge
Like many things in IT, there are BYOD challenges and advantages. Take this quiz and see how much you know about the pros and cons.Continue Reading
Mobile application delivery: How to do it and what to beware of
Mobile application delivery is a tough nut to crack. Every delivery option has drawbacks, such as cost, connectivity and user experience.Continue Reading
LTE-Advanced (Long Term Evolution-Advanced)
Long Term Evolution-Advanced (LTE-Advanced) is a cellular networking standard that offers higher throughput than its predecessor, the Long Term Evolution (LTE) standard.Continue Reading
app store (application store)
An app store (application store) is an online portal through which software programs are made available for procurement and download.Continue Reading
How personal email and the cloud are changing corporate email access
Employees' cloud and personal email accounts help them get work done, but email forwarding and cloud integration could make work tougher for IT.Continue Reading
Android device and security quiz
Despite their reputation for shoddy security, different Android devices and versions offer security and management features for IT. Test your Android knowledge.Continue Reading
Business cloud storage and file-sharing quiz
Test your knowledge of business cloud storage services and how to pick the right one for your company in this eight-question quiz.Continue Reading
mobile printing
Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.Continue Reading
Mobile data security quiz: Test your knowledge
Data security approaches have changed since workers have become more mobile. Take this quiz to see how much you know about keeping mobile data safe.Continue Reading
What, why and how: An enterprise MDM quiz
Many companies struggle to manage workers' devices. Have you tried MDM? See how much you know about enterprise MDM before implementing a system.Continue Reading
Nexus
Nexus is a series of smartphones and tablets manufactured by Google and its hardware partners. Nexus devices run the native Android operating system.Continue Reading
iPhone Configuration Utility
The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.Continue Reading
Quiz: Managing mobile devices in a health care setting
As smartphones and tablet PCs make their way into health care organizations, IT departments face many challenges. Take this quiz to see what you know about managing mobile devices.Continue Reading
fixed-mobile convergence (FMC)
Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks... (Continued)Continue Reading
RMON (Remote Network Monitoring)
RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central ...Continue Reading
real-time location system (RTLS)
A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.Continue Reading
camcorder (camera recorder)
A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.Continue Reading
wireless charging
Wireless charging is any of several methods of charging batteries without the use of cables. The three main methods of wireless charging are radio charging, resonance charging and inductive charging... (Continued)Continue Reading
resonance charging
Resonance charging is a wireless charging method for items that require large amounts of power, such as an electric car, robot, vacuum cleaner or laptop computer. The method works over small distances (3-5 meters)... (Continued)Continue Reading
Opera
Opera is a Web browser that provides some advantages over the two most popular browsers from Netscape and Microsoft...(Continued)Continue Reading
Web texting
Web texting is two-way text messaging from the Web to a handheld mobile device, usually a cellular phone.Continue Reading
SMS gateway
An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway. An SMS gateway can also serve as an international gateway for users with roaming capability, allowing SMS ...Continue Reading
common short code (CSC)
Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones. Common short codes may also be called mobile short codes or short numbers... (Continued)Continue Reading
SMS spam (cell phone spam or short messaging service spam)
SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly rare in North America, but has been common in Japan for years. In 2001-2002...Continue Reading