Tips
Tips
-
How to configure iPad for business use
Apple iPad Configuration Profiles and business apps turn the popular tablet into an enterprise workhorse without compromising data security. Continue Reading
-
Your EMM vendor was just acquired. Now what?
Find ways to prevent a disaster if your enterprise mobility management vendor is acquired, such as putting a clause in the contract for such an event. Continue Reading
-
Improving data and app security with SE Android
SE Android is kernel-level security that isolates applications from one another so they cannot interact, helping preserve data integrity. Continue Reading
-
Choosing remote access services for mobile workers
Remote access services give users access to their desktops from mobile devices. Check out this overview of five popular apps and tools. Continue Reading
-
How to use smartphone security settings
Smartphone security settings such as passcodes, encryption and network controls can help users secure their mobile phones and protect corporate data. Continue Reading
-
Which mobile cloud approach is right for your company?
A mobile cloud computing strategy can help workers be more productive on the go, but it's OK for some apps and data to stay on-prem. Continue Reading
-
Configuring Android smartphones and tablets for business use
With the right business mobile apps, Android smartphones and tablets can go from consumer toys to corporate tools. Continue Reading
-
How BlackBerry Balance works
BlackBerry Balance brings dual-persona technology to devices, but only ones that run the BlackBerry 10 operating system. Continue Reading
-
Cloud storage comparison: Dropbox vs. Box
Dropbox and Box can make mobile workers more productive, but features and prices vary. Both use a 'freemium' model that scales to business class. Continue Reading
-
Potential BYOD legal issues you may not have thought of
Some BYOD legal concerns are evident, such as invading users' privacy. Other concerns, such as liability and overtime, aren't as obvious. Continue Reading
-
Why IT should keep an eye on Samsung Tizen
Consumers and devs might find Samsung Tizen interesting, but it could be a different story for IT pros who are already juggling a lot of mobile OSes. Continue Reading
-
Workers find untapped knowledge with Evernote Business 2.0
Evernote Business 2.0 lets workers find one another based on the information they share and provides better integration with enterprise systems. Continue Reading
-
Top five mobile security concerns with consumerization
The rise of consumerization has introduced mobile security concerns for IT and users alike, including data loss and personal privacy troubles. Continue Reading
-
Understanding the HTML5 standard
Vendors are implementing HTML5 to take advantage of improved compatibility despite the fact that the standard won't be final until late 2014. Continue Reading
-
Choosing a file-sharing service: On-premises vs. third-party providers
When you know what features you want your file-sharing service to have, the next step is to decide whether you'll host it on-premises or not. Continue Reading