February 2012
-
February 29, 2012
29
Feb'12
Windows Phone 7 features: Is Windows Phone 7 enterprise ready?
Microsoft is trying to catch up with Apple and Google, so its Windows Phone 7 features target consumers. IT pros used to managing Windows Mobile will have some adjustments to make. Continue Reading
-
February 28, 2012
28
Feb'12
Microsoft iPad Office app coming soon?
Microsoft addresses rumors surrounding an iPad Office app, while IT pros speculate about Microsoft Office app costs and features. Continue Reading
-
February 28, 2012
28
Feb'12
Top five personal cloud storage and file-sharing services and what they mean for IT
Personal cloud storage and file-sharing services are catching on among consumers and business users alike, but some are more enterprise-ready than others. Continue Reading
-
February 24, 2012
24
Feb'12
BYOD strains corporate wireless network bandwidth
BYOD taxes the corporate wireless network, causing poor performance. Some companies have had to invest in significant wireless network bandwidth and security upgrades. Continue Reading
-
February 17, 2012
17
Feb'12
Apple iOS security attacks a matter of when, not if, IT pros say
The untarnished reputation of iOS security won’t last forever, and IT pros say they don’t have the weapons to defend against potential Apple security attacks. Continue Reading
-
February 17, 2012
17
Feb'12
Mobile data encryption techniques: On-device and on-the-go
The right mobile data encryption techniques can help IT and users secure sensitive corporate data on mobile devices. Plus, they make admins feel like the 007s of the enterprise. Continue Reading
-
February 10, 2012
10
Feb'12
Four mobile app delivery options for IT to consider
A good mobile app delivery strategy helps users do their jobs better and eases IT’s management burdens. App stores, Web and cloud apps and virtualization are some of IT’s options. Continue Reading
-
February 09, 2012
09
Feb'12
Giving enterprise software license compliance a boost with app stores
Here’s a benefit of enterprise app stores you may not have thought of: Using them to improve your enterprise software license compliance and asset management efforts. Continue Reading
-
February 09, 2012
09
Feb'12
Android app security offers IT little comfort, despite Google Bouncer
Google’s new Bouncer tool aims to relieve some IT woes by scanning Android Market apps for malware. But Android app security concerns remain. Continue Reading
-
February 08, 2012
08
Feb'12
Android app security FAQ: Keeping devices safe from Android threats
IT can’t really control the apps on users’ Android devices, and malware is one of the biggest Android threats. But fear not: There are ways to get a handle on Android app security. Continue Reading
-
February 07, 2012
07
Feb'12
Enterprise cloud file-sharing apps give IT more control over data
Employees already use cloud file-sharing and collaboration services such as Dropbox at work, whether IT knows it or not. Enterprise cloud file-sharing apps let IT regain control. Continue Reading
-
February 03, 2012
03
Feb'12
How an iOS virus can infect the enterprise and what to do about it
Your users may not need iOS virus protection on their Apple devices, but if they connect them to the corporate network, iPhone and iPad malware can still wreak havoc. Continue Reading
-
February 03, 2012
03
Feb'12
Microsoft Exchange Server ActiveSync Web Administration Tool
The Microsoft Exchange Server ActiveSync Web Administration Tool is a software application that provides a network administrator with a Web interface for mobile device management. Continue Reading
-
February 02, 2012
02
Feb'12
iPhone 3G
iPhone 3G is the second generation of iPhone, a smartphone made by Apple that combines an iPod, a tablet PC, a digital camera and a cellular phone. (Continued...) Continue Reading
-
February 02, 2012
02
Feb'12
Smartphone malware protection: Six steps for fighting cybercrime
McGruff the Crime Dog has a packed schedule, so IT has to take smartphone malware protection into its own hands. Install smartphone virus protection and educate users to start. Continue Reading