Mobile computing tutorials

SearchMobileComputing.com's tutorials provide informative online resources and information for IT managers regarding deployment, management and security of a mobile computing workforce. We provide comprehensive coverage and practical advice for selecting, tracking, supporting and securing mobile users and devices. With our tutorials, you'll discover a reliable source of ongoing ideas and best practices for using mobile computers and wireless infrastructures to build a streamlined business and gain a competitive advantage.

SearchMobileComputing.com's tutorials provide informative online resources and information for IT managers regarding

deployment, management and security of a mobile computing workforce. We provide comprehensive coverage and practical advice for selecting, tracking, supporting and securing mobile users and devices. With our tutorials, you'll discover a reliable source of ongoing ideas and best practices for using mobile computers and wireless infrastructures to build a streamlined business and gain a competitive advantage.

Mobile device security policies: Asserting control over mobile devices 
Many experts recommend that organizations establish a mobile device security policy, but a policy is worthless without the technology and processes to back it up. Managers and architects responsible for planning mobile devices and deployment need to understand the nuts and bolts of delivering access when device types and connectivity options are many. In this expert lesson, you'll find in-depth discussion of the various methods and tools required to authenticate, control, and secure enterprise network access by mobile endpoints, from laptops to smartphones.

Mobile device management checklist 
According to Forrester, employee handheld use expanded at 69% of North American businesses last year, but most still lack a cohesive plan to handle this fast-growing tidal wave. Ideally, IT should be managing those new smartphones and PDAs throughout their entire lifecycle, from activation to retirement. In this mobile device management checklist, we highlight business needs that you should consider when developing your own mobile device management strategy.

Study guide: Windows Mobile evolution 
In this guide, we recap Windows Mobile's evolution and look at the wide array of Windows Mobile-powered devices available to untether today's workforces. We'll explore where and why Windows Mobile devices are used to support a wide range of mobile apps, from vertical business automation to knowledge worker access. Finally, we'll examine the appeal of ready-to-roll apps like Office, Outlook, and Communicator Mobile that integrate seamlessly with enterprise and in-the-cloud Windows services.

Securing corporate data on your laptops 
Mobile computing has opened a whole new frontier in data security. In this tutorial, independent information security expert and noted author Kevin Beaver discusses laptop security issues he has recently seen in the field that you may not have considered or that you might be looking at from the wrong perspective. He'll outline what laptop security means to your business, tell you how to protect your valuable corporate data residing on your laptops and show you how laptop weaknesses are being exploited. This series concludes with a list of steps you can immediately take to ensure data protection and device security.

Developing and instituting corporate mobile device policies 
As enterprise mobile connectivity becomes increasingly pervasive, IT organizations face the challenge of creating mobile policies that allow users to be productive, while at the same time protecting corporate assets. This series is aimed at helping enterprises develop and institute a mobile policy.

This was first published in February 2011

Dig deeper on Mobile Management Tools

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchConsumerization

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close