Topics Archive News
February 05, 2016
With Super Bowl 50 kicking off Sunday, there is one team behind the scenes that plenty of mobile users in the stadium will be counting on -- and it’s not the Denver Broncos or Carolina Panthers. ...
May 29, 2015
As the global smartphone market slows, it's becoming readily apparent that the rise of smartphone security threats isn't slowing -- and no OS is safe.
March 07, 2014
Michelle Malcher, president of IOUG, discusses Oracle Mobile Security Suite and how using pre-existing technology can be a value-add.
February 02, 2012
BYOD enterprise policies are creating new remote access problems on the WAN. Find out how to get a better handle on iPads and smartphones invading your VPN.
Topics Archive Get Started
Bring yourself up to speed with our introductory content
It is impossible to recover lost time. Once a moment passes, it's gone. Time is especially at a premium in the business world, so end users can't waste it sorting through a sea of mobile data to ... Continue Reading
Global Positioning System (GPS) technology enables the user, through approximately 30 well-spaced, earth-orbiting satellites, to pinpoint one's geographic location through ground receivers and mobile devices. Continue Reading
A video conference is a live connection between people in separate locations for the purpose of communication, usually involving video, audio and text. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Topics Archive Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google is beginning to encrypt data by default on its Android devices. Expert Michael Cobb explains how this change will affect enterprise BYOD security. Continue Reading
Smartphones with gyroscopes can be exploited to serve as an eavesdropping tool. Expert Nick Lewis explains how to mitigate smartphone gyroscope risk. Continue Reading
There's a lot of confusion surrounding the HIPAA compliance requirements for mobile health apps. Expert Mike Chapple finally clears it up for health app vendors. Continue Reading
Manage Topics Archive
Learn to apply best practices and optimize your operations.
Diskpart is a disk management tool designed to create, delete and resize hard drive partitions, and assign or reassign drive letters in Windows client and server operating systems. Continue Reading
When mobile vendors stop maintaining security on their devices, enterprise data is at risk. Expert Michael Cobb discusses how to assess mobile product end of life and how to create end-of-life policies and controls to maintain BYOD safety. Continue Reading
Active Directory can no longer hold down the identity management services fort. You need cloud-based authentication and identity services to step in. Continue Reading
Problem Solve Topics Archive Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Advancements in 4G LTE networks improved the security of cellular data transmission, but it still varies wildly from network to network. Continue Reading
Our VPN security and remote access expert explains how to protect against application store threats in this Ask the Expert response. Continue Reading
Do you have remote workers using mobile devices in the office? Before you invoke a bring-your-own-device policy, learn about the risks of BYOD. Continue Reading