New & Notable


Is there a safe way to sideload Android apps?

Android users can sideload apps outside of the Google Play Store, but these apps aren't screened for malware like commercial apps are. IT must urge users to proceed with caution.


Biometric authentication coming to enterprise devices

The eye-opening reality: iris scans, and other biometric authentication methods, will soon be used for enterprise mobile security, phasing out the old username and password.


Uncover various mobile devices' enterprise potential

No two mobile devices are the same; some are just a better fit for the enterprise. Explore the workplace potential for devices such as the iPhone SE and BlackBerry Priv.


BlackBerry settles into software role

BlackBerry is moving from a hardware focus to a software focus. Thanks in part to its acquisition of Good Technology, the company is poised for a smooth transition.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Mobile Computing challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Mobile Computing Basics

  • Get Started

    Wi-Fi Protected Access (WPA)

    Wi-Fi Protected Access, or WPA, is a security standard for Wi-Fi wireless internet connections that gave way to WPA2 in 2004. WPA2 uses the Counter Mode Cipher Block Chaining Message Authentication Code Protocol and is based on the Advanced ...

  • Get Started

    tablet (tablet PC)

    A tablet is a wireless, portable personal computer with a touchscreen interface. The tablet form factor is typically smaller than a notebook computer, but larger than a smartphone.

  • Get Started

    Popular MBaaS and app refactoring tools to try

    Once developers know what type of mobile apps they need to build, they can focus on finding the right MBaaS or application refactoring tools to streamline their efforts.

View All Get Started

Blog: Modern Mobility

Sections from across SearchMobileComputing