Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
Google Hangouts
Google Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chats, either one-on-one or in a group. Continue Reading
OTA update (over-the-air update)
An over-the-air (OTA) update is the wireless delivery of new software, firmware, or other data to mobile devices. Continue Reading
New iOS 14 features that mobile admins should be excited for
With the impending release of iOS 14, mobile admins should learn the advancements that iOS 14 can offer and how the features can make a major difference in the enterprise. Continue Reading
-
Microsoft OneDrive
OneDrive (formerly SkyDrive) is an online cloud storage service from Microsoft. Continue Reading
Mobile Threat Defense (MTD)
Mobile Threat Defense (MTD) is a security software meant to protect organizations and individual users from security threats on mobile platforms. Continue Reading
enterprise mobility management (EMM)
Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.Continue Reading
Android OS
Android OS is a Linux-based mobile operating system that primarily runs on smartphones and tablets.Continue Reading
mobile device management (MDM)
Mobile device management (MDM) is software that allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.Continue Reading
Mobile Application Management (MAM)
Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.Continue Reading
Apple iOS
Apple iOS is a proprietary mobile operating system that runs on mobile devices such as the iPhone, iPad and iPod Touch.Continue Reading
-
telecommuting
Telecommuting is an arrangement to work outside the traditional office or workplace, usually at home or in a mobile situation.Continue Reading
mobile operating system
A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.Continue Reading
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API.Continue Reading
How can IT manage Android Things devices in the enterprise?
The Android Things program provides APIs that link atypical Android devices to Android smartphone management tools, so mobile admins must learn to manage Android Things devices.Continue Reading
What Android security threats should IT know about?
Mobile admins must understand the nature of the most recent Android security threats so they can protect users, but it's crucial to know where these verified threats are listed.Continue Reading
Ownership scenario should dictate mobile device policies
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions.Continue Reading
tvOS
TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.Continue Reading
remote wipe
Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.Continue Reading
LDAP (Lightweight Directory Access Protocol)
LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate data such as organizations, individuals and other resources such as files and devices in a network -- whether on the public internet or on a corporate ...Continue Reading
wireless ad-hoc network (WANET)
A wireless ad-hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring a central device, such as a router or access point.Continue Reading
New Apple MDM terms iOS admins should know
Apple introduced a new BYOD-friendly management mode for iOS and macOS and renamed the existing Apple MDM modes. Get up to speed with the three new terms.Continue Reading
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well.Continue Reading
smartphone
A smartphone is a cellular telephone with an integrated computer and other features not originally associated with telephones, such as an operating system, web browsing and the ability to run software applications.Continue Reading
consumerization of IT
IT consumerization is the blending of personal and business use of technology devices and applications. Gartner traced the trend to the dot-com collapse, when enterprise IT budgets shrank and many IT vendors shifted focus to the potentially bigger ...Continue Reading
Multimedia Messaging Service (MMS)
Multimedia Messaging Service (MMS) - sometimes called Multimedia Messaging System - is a communications technology developed by 3GPP (Third Generation Partnership Project) that allows users to exchange multimedia communications between capable ...Continue Reading
Enterprise mobility management software offerings and use cases
IT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market.Continue Reading
Clear up the confusion about end-user computing
Today's end-user computing industry is the culmination of a decade of changes in mobility, desktops, virtualization and more. Dive in to what really qualifies as EUC.Continue Reading
What are the benefits of Apple Business Manager?
IT should learn the benefits of Apple Business Manager to decide if the program's configuration and monitoring services are a worthwhile supplement to existing MDM or EMM tools.Continue Reading
Top 3 emerging mobile app development trends for 2019
These three emerging mobile app development strategies could change the way apps are developed in the future. Discover which of these methods is right for your organization.Continue Reading
Intro to iPhone encryption features for Apple admins
Encryption for iOS devices comes baked into the device itself, but iOS devices also have some significant enterprise-level protections that IT must enable and deploy policies for.Continue Reading
How the Intune App Wrapping Tool works for Android
Mobile application wrapping is an effective way to deploy policies that can't normally interact with an app. Learn how IT can use Intune's wrapping tool on Android apps.Continue Reading
SIM card
A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.Continue Reading
wireless access point
A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN). Typically, wireless routers are used in homes and small businesses where all users can be supported by one combined...Continue Reading
Transition to Android Enterprise management before Android Q
With the upcoming deprecation of Device Admin APIs, IT should look at the possibility of migration to Android Enterprise, Google's endorsed API program, for device management.Continue Reading
Best smartphone for business use relies on many key factors
Operating systems and security protection are among the key considerations when companies select smartphones for business use. Learn more about device options and decision points.Continue Reading
Considerations for choosing enterprise mobility tools
Mobile device management may be long gone, but IT pros still have many options to enroll, secure and manage their organization's fleet of mobile devices. Discover what the options are.Continue Reading
m-commerce (mobile commerce)
M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.Continue Reading
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods.Continue Reading
GSM (Global System for Mobile communication)
GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.Continue Reading
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services.Continue Reading
The end of hybrid Intune MDM and what IT needs to know
Some Microsoft Intune admins are unsure of what to do after the death of Intune hybrid MDM. IT should consider Azure or other MDM platforms to maintain key functions.Continue Reading
Google Play (Android Market)
Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.Continue Reading
Does enterprise file sync and share work on mobile devices?
Users who work with file sync-and-share apps on their mobile devices should be aware that auto-syncing works differently and that there are more security risks.Continue Reading
mobile malware
Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches.Continue Reading
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work.Continue Reading
Mobile application developer skills to know for an interview
One of the best ways to succeed in your mobile app dev career is to master the art of the interview. Review need-to-know technical skills and how to communicate them effectively.Continue Reading
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape.Continue Reading
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices.Continue Reading
How can organizations implement mobile app personalization?
Organizations that want to boost user engagement on a mobile app should use personalization. They can follow these steps to implement personalization effectively.Continue Reading
Evernote mobile app helps fill productivity gaps
Taking and organizing notes is an important part of many employees' jobs. Evernote can help business users manage notes, which can be even more critical on mobile devices.Continue Reading
What are the benefits of QR code enrollment?
IT can enroll devices into MDM using a QR code, which is a more attainable option as support expands. Discover the benefits of this process, including improved workflow and ease of use.Continue Reading
The complete Apple iOS guide for IT administrators
Apple iOS has become a legitimate enterprise option. IT admins must know about its security capabilities and how to manage devices. Developers should also learn the ins and outs of iOS app development.Continue Reading
instant app (Google Android instant app)
A Google Android instant app is a small software program that enables end users to test out a portion of a native Android app without installing it on a device.Continue Reading
Stay updated on the Android Enterprise Recommended program
Google made a few updates to Android Enterprise Recommended. Explore recent offerings from the proprietary Android enterprise device program, including support for rugged devices.Continue Reading
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps.Continue Reading
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system.Continue Reading
Mobile app testing tools embrace automation, open source
Organizations should think about mobile app testing from the beginning. Discover other best practices from the CTO of Sauce Labs, a mobile app testing company.Continue Reading
What mobile device analytics can do for you
The hype around analytics is real. When it comes to mobile, this technology can help IT administrators glean more information about users, business processes and more.Continue Reading
Pros of dedicated API services for cross-platform mobile apps
One API can rule them all -- but developers shouldn't be surprised if problems occur. Delve into the pros and cons of dedicated API services for cross-platform apps.Continue Reading
What are the benefits of mobile app A/B testing?
Mobile app A/B testing is the best way to prevent buggy features from reaching your users. Learn the benefits and discover how to get started with the process.Continue Reading
Pros and cons of a low-code platform for mobile
Low-code platforms for mobile app development come with plenty of controversy. Discover why developers hate them and how organizations can use them to empower end users.Continue Reading
How to create an inclusive endpoint management strategy
Smartwatches, IoT devices and sensors -- oh my! Endpoint management can get confusing quickly, but you can figure it out by answering these questions.Continue Reading
How virtual assistant technology will affect the enterprise
Mobile devices with AI and virtual assistants will affect the enterprise, as well as consumers. Learn how to prep your organization for the future.Continue Reading
How to implement tablets for enterprise use
To integrate tablets into the enterprise, IT needs to know more than just which tablet is the best fit. Discover the tools that can help IT enroll and maintain the new devices.Continue Reading
How Apple DEP works and why it's important
Apple's DEP was the groundbreaking template for the future of endpoint provisioning. The program helps businesses and educators simplify enrollment and management.Continue Reading
Unpack the role of Google's Flutter app dev framework
Google's new cross-platform framework, Flutter, could threaten Android's existence. Explore three theories about why the company developed its new tool.Continue Reading
Ruggedized devices face a mobile-fueled transition
The next generation of smartphones is more rugged than ever, and this trend will change the ruggedized device market. Learn how and know what to expect in the next few years.Continue Reading
push notification
Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.Continue Reading
LTE (Long Term Evolution)
Long Term Evolution (LTE) is a standard for 4G wireless broadband technology that offers increased network capacity and speed to mobile device users.Continue Reading
Developers reap benefits of iOS app modules with Swift
Many developers recognize the benefits of app modularization. Historically, it's been difficult to begin the process, but now changes from Apple provide more opportunity.Continue Reading
Test your knowledge of mobile app programming languages
Do you know the difference between native, web-based and hybrid mobile apps? Test your knowledge of mobile app development and languages with this quiz.Continue Reading
On-device machine learning offers security, reduced latency
Where should IT process machine learning data? Mobile devices can now process machine learning, but it's important to evaluate all the options -- including the cloud.Continue Reading
Develop an IAM strategy for the mobile enterprise
As the role of IAM evolves, it's important to be aware of current and future technologies. IT teams should review their needs, as well as the pros and cons of IAM, before deciding.Continue Reading
Three questions to fuel a mobile app development project
It's not cheap to build a mobile app, so IT pros should do their research first. Here's how to determine the cost and discover which tools and trends your organization should adopt.Continue Reading
cross-platform mobile development
Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.Continue Reading
Mobility strategies shift toward UEM, IAM in 2018
IT is changing priorities when it comes to fitting mobile management into end-user computing strategies. Learn what some recent stats show about the new age of mobile.Continue Reading
What to know before implementing an IAM system
IT administrators have many features to choose from and requirements to meet when looking for an IAM tool. Check these boxes before committing to IAM.Continue Reading
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections, or Wi-Fi.Continue Reading
iPhone
IPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface. The iPhone runs the iOS operating system.Continue Reading
How well do you know EMM platforms?
Enterprise mobility management is made up of many different facets, including MDM and MCM. Do you know the difference between them? Test your knowledge with this quiz.Continue Reading
How to track mobile app performance metrics
Developers that don't track mobile app health will get little insight into the user experience. Learn these effective strategies to track and understand mobile app performance metrics.Continue Reading
Pros and cons of AI for mobile IT
Mobile IT admins should be prepared to take advantage of artificial intelligence technologies, but it's important to be aware of the risks and challenges involved, as well.Continue Reading
How should IT handle app onboarding for employees?
When it comes to onboarding a mobile app for internal use, IT should make the process as easy as possible. Here are several strategies to help.Continue Reading
Mobile application management tools balance service and cost
Finding the right mobile application management tool can be challenging. Discover whether it's best to choose a stand-alone MAM tool over an integrated EMM suite.Continue Reading
IT must prep for enterprise AI software
AI technology is growing fast, and end-user computing administrators need to be prepared for the multitude of benefits it can bring IT and employees.Continue Reading
Understand chatbot use cases and features for business
The bot that chattered with you over AOL Instant Messenger isn't too far off from the way chatbot technology can work in corporate mobile apps.Continue Reading
Siri
Siri is Apple's personal assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).Continue Reading
Google Drive
Google Drive is a free cloud-based storage service that enables users to store and access files online.Continue Reading
Explore the features of unified endpoint management
UEM can ease pain points for IT or it could create complications. To decide whether this is a good approach, IT pros should do their research.Continue Reading
Take a mobile-first approach to digital transformation
There's no denying it: Smartphones have changed everything, from personal life to business. Get on board with digital transformation.Continue Reading
Mobile is at the forefront of digital transformation trends
As 'digital transformation' dominates discussion, understand why it's important to keep mobile at the forefront of the initiative -- and what you can do to get started.Continue Reading
Explore the pros and cons of identity federation management
Identity federation is a relatively new technology in mobile, but it comes with challenges. Understand how to make deployment painless before adopting it.Continue Reading
mobile enterprise application platform (MEAP)
A mobile enterprise application platform (MEAP) is a development environment that provides tools and middleware to develop, test, deploy and manage corporate software running on mobile devices.Continue Reading
Five steps to effective usability testing for mobile apps
To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it out. These tips can help perfect the process.Continue Reading
The new role of identity and authentication in the enterprise
It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills the need -- but you'll need to navigate it first.Continue Reading
How to approach mobile password management for the enterprise
When simple passwords no longer provide sufficient security, look to other options. Here are some ways to modernize password management for your enterprise.Continue Reading
Tighten mobile security for the enterprise with new strategies
It's important to update your organization's mobile security strategy. Stay informed with new security methods, such as biometric authentication and edge gateways.Continue Reading
Simplify mobile app development for the enterprise
Without the right resources, app dev can be complicated. Start out the process on the right foot and have all the best tools in your arsenal to avoid a development dilemma.Continue Reading
A handy mobile app testing checklist for developers
Application testing is a necessity in the era of enterprise mobility. Define the right testing criteria and adopt the proper tools to build and deliver high-quality mobile apps.Continue Reading
Active Directory Federation Services (AD FS)
Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall.Continue Reading