New & Notable
Topics Archive News
November 16, 2017
Samsung profits for its mobile business slid backwards in quarter three sales. Samsung is using this opportunity to boost investments in high-end products.
November 20, 2016
With the rise of multifactor authentication and updates to Apple iOS security, there is a lot to look forward to next year. Four experts gaze into the enterprise mobility crystal ball. Patrick ...
November 07, 2016
For years it seemed like mobile devices would dictate the future of IT. Mobility is certainly a huge part of what's next, but it may not be the real trailblazer. "For the most part the mobile ...
February 05, 2016
With Super Bowl 50 kicking off Sunday, there is one team behind the scenes that plenty of mobile users in the stadium will be counting on -- and it’s not the Denver Broncos or Carolina Panthers. ...
Topics Archive Get Started
Bring yourself up to speed with our introductory content
Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections, or Wi-Fi. Continue Reading
IPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface. The iPhone runs the iOS operating system. Continue Reading
Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor. Continue Reading
Evaluate Topics Archive Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A native application is a software program that is developed for use on a particular platform or device. Continue Reading
Since the release of the iPhone in 2007, smartphone technology has become so advanced that the devices really are mini computers. But that doesn't mean they'll replace actual PCs. Innovations to ... Continue Reading
Google is beginning to encrypt data by default on its Android devices. Expert Michael Cobb explains how this change will affect enterprise BYOD security. Continue Reading
Manage Topics Archive
Learn to apply best practices and optimize your operations.
Diskpart is a disk management tool designed to create, delete and resize hard drive partitions, and assign or reassign drive letters in Windows client and server operating systems. Continue Reading
When mobile vendors stop maintaining security on their devices, enterprise data is at risk. Expert Michael Cobb discusses how to assess mobile product end of life and how to create end-of-life policies and controls to maintain BYOD safety. Continue Reading
There's a lot of confusion surrounding the HIPAA compliance requirements for mobile health apps. Expert Mike Chapple finally clears it up for health app vendors. Continue Reading
Problem Solve Topics Archive Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Advancements in 4G LTE networks improved the security of cellular data transmission, but it still varies wildly from network to network. Continue Reading
Smartphones with gyroscopes can be exploited to serve as an eavesdropping tool. Expert Nick Lewis explains how to mitigate smartphone gyroscope risk. Continue Reading
Active Directory can no longer hold down the identity management services fort. You need cloud-based authentication and identity services to step in. Continue Reading