SearchMobileComputing
New & Notable
Evaluate
UEM steps into the spotlight as EMM fades away
As IT has been overwhelmed with too many tools to manage devices, UEM attempts to simplify the situation. Here's what to expect in the years to come and what organizations should do.
News
New Samsung eUFS brings 1 TB internal phone storage
Samsung's new embedded Universal Flash Storage brings 1 TB of potential problems for IT.
News
How can IT prevent mobile cryptojacking?
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack.
Problem Solve
Running Linux on DeX presents deployment issues
Using DeX, users can create a Linux desktop with their Samsung smartphones. But IT should be aware of the challenges with its deployment and management.
Trending Topics
-
EMM tools Evaluate
UEM steps into the spotlight as EMM fades away
As IT has been overwhelmed with too many tools to manage devices, UEM attempts to simplify the situation. Here's what to expect in the years to come and what organizations should do.
-
Application development Get Started
How to succeed at a mobile app dev interview
One of the best ways to succeed in your mobile app dev career is to master the art of the interview. Review need-to-know technical skills and how to communicate them effectively.
-
App delivery and modernization Evaluate
How the post-app era will affect mobility
The post-app era doesn't mean apps are going away; on the contrary, mobile apps are simply evolving to perform more than one function. The shift should be on IT's radar.
-
Enterprise mobile app strategy News
Mobile field service apps on the rise
Old habits die hard, but mobile field service apps have staying power as they secure and ease communication and reporting across various industries and business sizes.
-
Apple iOS Problem Solve
Simplify authorization with OAuth 2.0 in iOS 12
Learn about the history of OAuth and Apple and how iOS 12 changed the game for authorization. There are a few things to be wary of, too.
-
Google Android Get Started
Android Enterprise Recommended expands support
Google made a few updates to Android Enterprise Recommended. Explore recent offerings from the proprietary Android enterprise device program, including support for rugged devices.
Topics Covered
-
Enterprise mobility management software and strategy (4) +
-
Mobile infrastructure and applications (4) +
-
Mobile operating systems and devices (5) +
Have a question for an expert?
Please add a title for your question
Get answers from your peers on your most technical Mobile Computing challenges.
Meet all of our Mobile Computing experts
-
asks:
How would you use 1TB of phone storage?
Find Solutions For Your Project
-
Evaluate
How to set backup policies for MDM-enrolled devices
Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow in COPE, BYOD and COBO scenarios.
-
UEM steps into the spotlight as EMM fades away
-
How to find the right tool for mobile threat defense
-
Prepare for these mobile technologies in 2019
-
-
Problem Solve
Running Linux on DeX presents deployment issues
Using DeX, users can create a Linux desktop with their Samsung smartphones. But IT should be aware of the challenges with its deployment and management.
-
Simplify authorization with OAuth 2.0 in iOS 12
-
How to configure app protection settings with Intune
-
How admins can prep for Intune in the cloud
-
-
Manage
The next generation of mobile device user experience
Mobile users expect more from their employers these days. Thankfully, new technologies are making it possible for organizations to ride the latest evolution in mobile experiences.
-
How to choose, purchase and enroll mobile devices
-
Don't forget mobile in an incident response plan
-
What new features help secure iOS devices?
-
Mobile Computing Basics
-
Get Started
The latest changes to Intune and how they affect IT
Some Microsoft Intune admins are unsure of what to do after the death of Intune hybrid MDM. IT should consider Azure or other MDM platforms to maintain key functions.
-
Get Started
Google Play (Android Market)
Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.
-
Get Started
Desktop vs. mobile versions of file sync-and-share apps
Users who work with file sync-and-share apps on their mobile devices should be aware that auto-syncing works differently and that there are more security risks.
Multimedia
Vendor Resources
- Unified Endpoint Management –Resource
- How to Improve Productivity Through Desktop Tech –Product Overview
- Predictive Mobile Threat Defense –White Paper
Blog: Modern Mobility
-
Top new iOS 12 features helpful for the enterprise
The biggest takeaway of Apple WWDC 2018 was the new iOS 12 features. Discover which ones might be useful for business workers with this roundup.Continue Reading
-
XenMobile MAM covers all bases as Citrix joins AppConfig Community
XenMobile MAM now supports AppConfig Community standards, in addition to Citrix's proprietary MDX toolkit and Office 365 MAM through the Intune Graph API.Continue Reading
-
More Modern Mobility Posts
IT can block iOS updates in iOS 11.3 — finally!
Samsung profits dip as users hold onto smartphones longer
CEO of BlackBerry downplays enterprise mobility management
-
News
View All -
Mobile data, back-end services and infrastructure
New Samsung eUFS brings 1 TB internal phone storage
Samsung's new embedded Universal Flash Storage brings 1 TB of potential problems for IT.
-
Enterprise mobile security
AWS promises simpler, secure mobile device access with WorkLink
Amazon WorkLink enables users to access behind-the-firewall content with their mobile devices and helps eliminate cumbersome VPN and mobile device management setups.
-
Enterprise mobile security
IT must watch out for Apple DEP security pitfall
IT admins can expose an organization to a variety of threats while using Apple DEP if they're not careful. But there are ways to sidestep a DEP security issue that could be problematic.