Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
How virtual assistant technology will affect the enterprise
Mobile devices with AI and virtual assistants will affect the enterprise, as well as consumers. Learn how to prep your organization for the future. Continue Reading
How to implement tablets for enterprise use
To integrate tablets into the enterprise, IT needs to know more than just which tablet is the best fit. Discover the tools that can help IT enroll and maintain the new devices. Continue Reading
How Apple DEP works and why it's important
Apple's DEP was the groundbreaking template for the future of endpoint provisioning. The program helps businesses and educators simplify enrollment and management. Continue Reading
-
Unpack the role of Google's Flutter app dev framework
Google's new cross-platform framework, Flutter, could threaten Android's existence. Explore three theories about why the company developed its new tool. Continue Reading
Ruggedized devices face a mobile-fueled transition
The next generation of smartphones is more rugged than ever, and this trend will change the ruggedized device market. Learn how and know what to expect in the next few years. Continue Reading
-
Definitions to Get Started
- What is SMS (Short Message Service)?
- Android OS
- What is an SSID (service set identifier)?
- Apple Watch
- iPhone
- What is a personal area network (PAN)?
- What is LDAP (Lightweight Directory Access Protocol)?
- What is geolocation? Explaining how geolocation data works
Developers reap benefits of iOS app modules with Swift
Many developers recognize the benefits of app modularization. Historically, it's been difficult to begin the process, but now changes from Apple provide more opportunity.Continue Reading
Test your knowledge of mobile app programming languages
Do you know the difference between native, web-based and hybrid mobile apps? Test your knowledge of mobile app development and languages with this quiz.Continue Reading
On-device machine learning offers security, reduced latency
Where should IT process machine learning data? Mobile devices can now process machine learning, but it's important to evaluate all the options -- including the cloud.Continue Reading
Develop an IAM strategy for the mobile enterprise
As the role of IAM evolves, it's important to be aware of current and future technologies. IT teams should review their needs, as well as the pros and cons of IAM, before deciding.Continue Reading
Three questions to fuel a mobile app development project
It's not cheap to build a mobile app, so IT pros should do their research first. Here's how to determine the cost and discover which tools and trends your organization should adopt.Continue Reading
-
Mobility strategies shift toward UEM, IAM in 2018
IT is changing priorities when it comes to fitting mobile management into end-user computing strategies. Learn what some recent stats show about the new age of mobile.Continue Reading
How well do you know EMM platforms?
Enterprise mobility management is made up of many different facets, including MDM and MCM. Do you know the difference between them? Test your knowledge with this quiz.Continue Reading
How to track mobile app performance metrics
Developers that don't track mobile app health will get little insight into the user experience. Learn these effective strategies to track and understand mobile app performance metrics.Continue Reading
Pros and cons of AI for mobile IT
Mobile IT admins should be prepared to take advantage of artificial intelligence technologies, but it's important to be aware of the risks and challenges involved, as well.Continue Reading
How should IT handle app onboarding for employees?
When it comes to onboarding a mobile app for internal use, IT should make the process as easy as possible. Here are several strategies to help.Continue Reading
IT must prep for enterprise AI software
AI technology is growing fast, and end-user computing administrators need to be prepared for the multitude of benefits it can bring IT and employees.Continue Reading
Understand chatbot use cases and features for business
The bot that chattered with you over AOL Instant Messenger isn't too far off from the way chatbot technology can work in corporate mobile apps.Continue Reading
Explore the features of unified endpoint management
UEM can ease pain points for IT or it could create complications. To decide whether this is a good approach, IT pros should do their research.Continue Reading
Take a mobile-first approach to digital transformation
There's no denying it: Smartphones have changed everything, from personal life to business. Get on board with digital transformation.Continue Reading
Mobile is at the forefront of digital transformation trends
As 'digital transformation' dominates discussion, understand why it's important to keep mobile at the forefront of the initiative -- and what you can do to get started.Continue Reading
Explore the pros and cons of identity federation management
Identity federation is a relatively new technology in mobile, but it comes with challenges. Understand how to make deployment painless before adopting it.Continue Reading
Five steps to effective usability testing for mobile apps
To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it out. These tips can help perfect the process.Continue Reading
The new role of identity and authentication in the enterprise
It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills the need -- but you'll need to navigate it first.Continue Reading
How to approach mobile password management for the enterprise
When simple passwords no longer provide sufficient security, look to other options. Here are some ways to modernize password management for your enterprise.Continue Reading
Tighten mobile security for the enterprise with new strategies
It's important to update your organization's mobile security strategy. Stay informed with new security methods, such as biometric authentication and edge gateways.Continue Reading
A handy mobile app testing checklist for developers
Application testing is a necessity in the era of enterprise mobility. Define the right testing criteria and adopt the proper tools to build and deliver high-quality mobile apps.Continue Reading
Buy the right enterprise mobile devices for your workers
Tablets and smartphones are a growing must-have for modern workers. Learn how you can sort through the vast array of options and determine the best vendors for your organization.Continue Reading
How to choose the best identity access management software
Many IAM products flood today's market, with a variety of different features. Prioritize which capabilities are essential to the business before you make a final decision.Continue Reading
A mobile app security checklist for developers
When developing an app, security should be the number one priority. Review these tips for ensuring rock-solid security for your enterprise mobile app.Continue Reading
What are the biggest mobile device security threats?
As long as there are mobile devices, there will always be security risks for organizations to face. Four IT professionals share what they think the worst issues are today.Continue Reading
How IT can develop and deploy mobile apps
If IT's goal is to get enterprise mobile apps to employees, there are several ways to go about it. The top development and deployment approaches are popular for a reason.Continue Reading
VMware AirWatch
VMware AirWatch is an enterprise mobility software provider based in Atlanta. AirWatch, a division of virtualization vendor VMware, provides technologies that help IT administrators deploy, secure and manage mobile devices, applications and data, as...Continue Reading
An introduction to mobile application design
Mobile application design isn't always easy. An effective design keeps user experience at the forefront of the design process. Without that, an enterprise mobile app could fail.Continue Reading
Apple TV (Apple TV 4)
Apple TV is a set-top box that allows end users to stream multimedia content from the Internet over a television.Continue Reading
Three essentials for an effective mobile app strategy
With mobile apps invading the enterprise, it's time to develop a strategy using a set of universal app development tools.Continue Reading
What are the best ways to use tablets for business?
As more enterprises begin to support tablets, many users find that the screen size and portability provides the right balance for common work-related tasks such as note taking.Continue Reading
Android device management: Everything you need to know in one guide
The Google Android mobile operating system runs on a wide variety of devices. Learn how IT can manage and secure such a diverse OS in the enterprise.Continue Reading
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys.Continue Reading
Setting standards for in-house app development and delivery
As with anything, mobile application development goes best when IT comes in with a well-thought-out plan. Learn how to optimize your app dev and delivery process.Continue Reading
Get to know Android for Work profiles and productivity features
Now that Android for Work is out, we dig into the features of the program’s work profiles and productivity apps.Continue Reading
Apple Device Enrollment Program streamlines deployment, MDM
The Apple Device Enrollment Program allows IT pros to automate deployment, and they can also preset mandatory MDM configurations out of the box.Continue Reading
Rooted Android device risks include network access, data theft
Rooting an Android smartphone or tablet makes the device more vulnerable to malicious apps that could wreak havoc on a corporate network. MDM alone can't stop the threat.Continue Reading
How Box integration works with other enterprise apps
To get the most out of Box, use its APIs to integrate your enterprise applications with its cloud storage platform.Continue Reading
Pros and cons of using secure containers for mobile device security
With BYOD on the rise, IT needs to keep sensitive corporate information safe. Secure containers are one way to do that, but when’s best to use them?Continue Reading
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use.Continue Reading
Everything you need to know about developing mobile apps
Developing mobile apps for your users can help them be more productive, but before you start building apps, learn about the different kinds.Continue Reading
BYOD challenges and advantages: Test your knowledge
Like many things in IT, there are BYOD challenges and advantages. Take this quiz and see how much you know about the pros and cons.Continue Reading
Mobile application delivery: How to do it and what to beware of
Mobile application delivery is a tough nut to crack. Every delivery option has drawbacks, such as cost, connectivity and user experience.Continue Reading
mobile printing
Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.Continue Reading
iPhone Configuration Utility
The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.Continue Reading
fixed-mobile convergence (FMC)
Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks... (Continued)Continue Reading
RMON (Remote Network Monitoring)
RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central ...Continue Reading
SMS spam (cell phone spam or short messaging service spam)
SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly rare in North America, but has been common in Japan for years. In 2001-2002...Continue Reading