• June 10, 2009 10 Jun'09

    Mobile security threats

    Mobile security threats come in many forms, and they continue to evolve. IT needs to be prepared to handle mobile device security and protect smartphones from malware, eavesdropping, unauthorized access, theft and more. This tip outlines the mobile ...  Continue Reading

  • June 02, 2009 02 Jun'09

    Untethering the smartphone with an enterprise application store

    Handset vendors, such as BlackBerry and Apple, have simplified installation of smartphone applications. The irony: Although smartphones are the most connected enterprise devices, many operating systems and applications still require the smartphone ...  Continue Reading

  • June 01, 2009 01 Jun'09

    Mobile unified communications services

    The growth of mobile phone usage and the availability of desktop unified communications (UC) solutions have created an opportunity for vendors and service providers to introduce products that enable mobile users to access many of the features that ...  Continue Reading