Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Apple seeks to better iPad, iPhone security via FIPS 140-2 compliance
Apple Inc.'s decision to seek FIPS 140-2 validation for its iPad and iPhone devices signals its intent to enter the world of government IT. Continue Reading
Exchange Server 2010 features pinpoint mobile device issues
If you've recently deployed Exchange Server 2010 in your organization and a user calls with a mobile device problem, look at the Exchange Control Panel first to start diagnosing the problem. Continue Reading
Mobile device integration services: Choosing a mobile operating system
To offer mobile device integration services, a solution provider must be able to recommend the right operating system for mobile devices. Depending on a customer's needs, a solution provider should be able to provide a mobile OS comparison and guide... Continue Reading
-
An introduction to Android for mobile application development
Introducing Android, Chapter 1, from 'Android Wireless Application Development,' explores the benefits this open source platform brings to mobile application development. Continue Reading
Strategic planning for mobile applications
Mobility introduces new possibilities for communication and collaboration by extending access to existing enterprise applications to mobile devices. But enterprises are challenged to find a way to do so easily and cost effectively. In this series, ... Continue Reading
Mobile security policies
Mobile security policies are necessary for a safe mobile environment. In this series you'll discover three key elements that are essential to your mobile security policy and learn how government regulations affect what is required in your policy.Continue Reading
Is there a specific WCDMA SIM card?
A specific WCDMA SIM card evolves to become a USIM card and thereby plays an important role in managing the user experience on higher bandwidth networks.Continue Reading