Features
Features
-
The best desktop developments of 2010: The Apple iPad
The Apple iPad has re-energized the tablet industry. See what else made our list of the best and worst enterprise desktop developments of the year. Continue Reading
-
Exchange Server and the iPhone: What you need to know
Is the iPhone the best mobile device for an Exchange organization? The decision is ultimately up to you, but our tutorial is a good place to start. Continue Reading
-
Phil Agcaoili: Consumerization of IT and enterprise evolution
Consumer devices in the workplace and the shift to cloud services require new security standards and heightened security awareness. Continue Reading
-
Product review: Top smartphone expense reporting applications
Smartphone expense reporting applications from Concur and Expensify simplify expense tracking for road warriors. Standalone mobile expense reporting tools from iXpenseIt and ExpenseManager are comparable apps for smartphone devices. Continue Reading
-
IBM & Microsoft mobile clients: Unified communications for smartphones
IBM and Microsoft are unified communications market leaders and have developed mobile clients for smartphones. Learn how to extend your traditional IBM and Microsoft network tools and applications to your smartphone. Continue Reading
-
Enterprise mobile security: Learn the keys to mobile app/OS protection
As users grow more mobile device-dependent, enterprise mobile security has become imperative. This chapter from "Mobile Application Security" details how to protect devices and safeguard mobile apps. Continue Reading
-
The best Palm Pre accessories: Add-ons, batteries, chargers and much more
Looking for the best Palm Pre accessories to customize your new smartphone? This chapter from the book "How to do Everything: Palm Pre" showcases products that can help you get more out of your device, and give it some personality to boot. Continue Reading
-
Mobile device security policies: Asserting control over mobile devices
In this expert lesson, you'll find in-depth discussion of the various methods and tools required to authenticate, control and secure enterprise network access by mobile endpoints, from laptops to smart phones. Continue Reading
-
Establishing secure mobile communication
Find out how to establish secure mobile communication, including how to encrypt mobile laptop, PDA and smartphone transactions using tools that can enforce over-the-air security, no matter the device or network type. Continue Reading
-
Managing mobile authentication methods
Find tips for managing mobile authentication methods and learn how to control what mobile laptops, PDAs and smartphones can and cannot do inside your network. Continue Reading
-
The best Palm Pre accessories: Add-ons, batteries, chargers and more
Looking for the best Palm Pre accessories to customize your new smartphone? This chapter from the book "How to do Everything: Palm Pre" showcases products that can help you get more out of your device, and give it some personality to boot. Continue Reading
-
BlackBerry application development: Determining the best approach
This chapter from the book, BlackBerry Development Fundamentals covers the capabilities of the BlackBerry application platform and delves into application development in detail. Continue Reading
-
An introduction to Android for mobile application development
Introducing Android, Chapter 1, from 'Android Wireless Application Development,' explores the benefits this open source platform brings to mobile application development. Continue Reading
-
Nokia to enter the netbook market
Nokia announced today that it was expanding beyond its traditional phone marketplace and will release a small Windows-powered netbook built around an Intel Atom chip. With this act, Nokia has moved from its reliance on the "Internet on a phone" ... Continue Reading
-
Mobile Radio Systems
The basics of mobile radio design and the performance issues of delivering IP applications over mobile radio networks. Continue Reading