Managing Mobile Users News
June 02, 2011
School districts that adopt iPad-in-the-classroom programs must upgrade their wireless LAN technology in order to support the new mobile devices.
September 24, 2008
Fixed-mobile convergence vendor DiVitas has added rich mobile unified communications features to its client and boosted its scalability by switching to a software-based approach.
June 08, 2005
Microsoft says it will soon answer the pleas of mobile device administrators by adding handheld device management capabilities to its Exchange Server e-mail system.
Managing Mobile Users Get Started
Bring yourself up to speed with our introductory content
A tablet is a wireless, portable personal computer with a touchscreen interface. The tablet form factor is typically smaller than a notebook computer, but larger than a smartphone. Continue Reading
When mobile vendors stop maintaining security on their devices, enterprise data is at risk. Expert Michael Cobb discusses how to assess mobile product end of life and how to create end-of-life policies and controls to maintain BYOD safety. Continue Reading
Location awareness is a component of presence technology that delivers information about a device's physical location to another user or application. The location is usually determined by one of three methods... (Continued) Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Managing Mobile Users Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Users love downloading apps, which can make mobile application security, especially on employee-owned BYO devices, difficult to ensure. Find out how to improve mobile app security. Continue Reading
Mobile device management software simplifies the complexity of supporting and securing the influx of mobile devices and multiple mobile operating systems in the enterprise. Continue Reading
As users grow more mobile device-dependent, enterprise mobile security has become imperative. This chapter from "Mobile Application Security" details how to protect devices and safeguard mobile apps. Continue Reading
Manage Managing Mobile Users
Learn to apply best practices and optimize your operations.
Our VPN security and remote access expert explains how to protect against application store threats in this Ask the Expert response. Continue Reading
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis. Continue Reading
Learn about the core functions of mobile device management (MDM) systems so you can select the most comprehensive MDM system for your enterprise needs. Continue Reading
Problem Solve Managing Mobile Users Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security. Continue Reading
Presence is both a key feature and a key problem of unified communications systems. Busy workers rarely take the time to update their presence status so the technology is not used as intended. However, mobile presence is poised to change that. ... Continue Reading
Real-time location systems (RTLS) have been around for years. Retailers use these systems to track inventory, and trucking companies use them for fleet tracking. Although the two applications sound similar, the underlying RTLS technology for both ... Continue Reading