Tutorials
Tutorials
-
Cloud infrastructure for mobile application development
Building mobile applications for multiple devices is one of the critical issues in mobile development and can be solved with a few simple ideas. Continue Reading
-
Bringing BYOD to your enterprise
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed. Continue Reading
-
Enterprise device management: A brave new world
Windows desktops aren't the only game in town. Smartphones and tablets are changing the face of IT client management, whether you like it or not. Continue Reading
-
Making the call: Distributed antenna systems and in-building wireless
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility. Continue Reading
-
Mobile enterprise application platforms: A primer
A mobile enterprise application platform provides application development and management capabilities for mobile enterprises. Continue Reading
-
Mobile computing tutorials
SearchMobileComputing.com's tutorials provide informative online resources and information for IT managers regarding deployment, management and security of a mobile computing workforce. We provide comprehensive coverage and practical advice for ... Continue Reading
-
Configure CA certificates for iPhone and Exchange Server 2007
Since the iPhone was not originally intended for enterprise use, certain operating system components -- like the certificate store -- are hard to locate and configure. But by following a few steps and properly configuring your certificates, the ... Continue Reading
-
Identify Exchange Server 2010 ActiveSync certificate errors
There are numerous issues that can prevent ActiveSync from working properly on Exchange Server 2010 mobile devices. But certificate-related issues are usually the most common causes. Get troubleshooting basics to ensure your certificates are ... Continue Reading
-
Exchange Server 2010 features pinpoint mobile device issues
If you've recently deployed Exchange Server 2010 in your organization and a user calls with a mobile device problem, look at the Exchange Control Panel first to start diagnosing the problem. Continue Reading
-
WiMAX tutorial
As the WiMAX industry has grown, so has WiMAX hype and confusion. Mobility managers and decision makers have to sort through the hype to facilitate their knowledge and understanding of WiMAX technology. SearchMobileComputing.com asked Paul DeBeasi, ... Continue Reading
-
Bluetooth tutorial
Bluetooth is appearing everywhere -- in cellphones, smartphones, headsets, cars and laptops. This guide is designed to explain Bluetooth, how it works, how it can be used and where it fits into the world of wireless. You'll find Bluetooth articles, ... Continue Reading
-
Step 2: How to crack a laptop
Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ... Continue Reading
-
Step 1: How it can happen
Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ... Continue Reading
-
Laptop hacking step by step
Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ... Continue Reading
-
3G overview
This 3G overview describes the many benefits of 3G wireless technologies. Continue Reading
-
WLAN implementation
These resources will help you avoid potential pitfalls to ensure that your wireless LAN implementation is successful from start to finish. Continue Reading