Tutorials

Tutorials

  • Mobile computing tutorials

    SearchMobileComputing.com's tutorials provide informative online resources and information for IT managers regarding deployment, management and security of a mobile computing workforce. We provide comprehensive coverage and practical advice for ...  Continue Reading

  • Configure CA certificates for iPhone and Exchange Server 2007

    Since the iPhone was not originally intended for enterprise use, certain operating system components -- like the certificate store -- are hard to locate and configure. But by following a few steps and properly configuring your certificates, the ...  Continue Reading

  • Identify Exchange Server 2010 ActiveSync certificate errors

    There are numerous issues that can prevent ActiveSync from working properly on Exchange Server 2010 mobile devices. But certificate-related issues are usually the most common causes. Get troubleshooting basics to ensure your certificates are ...  Continue Reading

  • Exchange Server 2010 features pinpoint mobile device issues

    If you've recently deployed Exchange Server 2010 in your organization and a user calls with a mobile device problem, look at the Exchange Control Panel first to start diagnosing the problem.  Continue Reading

  • WiMAX tutorial

    As the WiMAX industry has grown, so has WiMAX hype and confusion. Mobility managers and decision makers have to sort through the hype to facilitate their knowledge and understanding of WiMAX technology. SearchMobileComputing.com asked Paul DeBeasi, ...  Continue Reading

  • Bluetooth tutorial

    Bluetooth is appearing everywhere -- in cellphones, smartphones, headsets, cars and laptops. This guide is designed to explain Bluetooth, how it works, how it can be used and where it fits into the world of wireless. You'll find Bluetooth articles, ...  Continue Reading

  • Step 2: How to crack a laptop

    Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ...  Continue Reading

  • Step 1: How it can happen

    Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ...  Continue Reading

  • Laptop hacking step by step

    Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ...  Continue Reading

  • 3G overview

    This 3G overview describes the many benefits of 3G wireless technologies.  Continue Reading

  • WLAN implementation

    These resources will help you avoid potential pitfalls to ensure that your wireless LAN implementation is successful from start to finish.  Continue Reading

SearchNetworking

SearchUnifiedCommunications

SearchSecurity

Close