Mobility

Articles

App Development: Getting More Complex

Try keeping up with the relative merits of different approaches to development, emerging ways of customizing apps based on data gathered about the device’s user and, as always, the status of security. More >

Why Government Apps Are Totally Lame (And How to Fix It)

The problem seems to be the lack of a clear strategy of prioritizing critical services first. More >

Performance Measurements Show Great Disparities in ISP Performance

Tech news this week finds disparity among ISP throughput, optical network evolution, millennials embrace smart home devices and BYOD issues. More >

Wearable Apps: Ten Factors Developers and Testers Need to Know

The biggest challenge for companies that want to develop for wearables is ensuring that quality matches user expectations. More >

Optimizing Graphical Web Content: Ten Dos and Don’ts

Data has shown that 56 percent of websites either do a poor job of optimizing images or don’t do it at all. What can be done when optimizing images for websites and what should you avoid? More >

Two-Factor Authentication: Better Than Passwords But Still Not Foolproof

Already, criminals have developed a spear phishing attack that bypasses two-factor authentication methods on mobile devices to gain access to email accounts. More >

More Articles >

Interviews

Appster Exec Shares Insights on Smartwatch Prospects

An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.

More >

Global Employee Study Guides Dell’s Flexible Workforce Strategy

Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.

More >

Study by Dell, Intel Sheds Light on Employees’ Technology Adoption, Expectations

The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.

More >

More Interviews >

Most Popular Features

Five Trends Shaping the Future of IT

Five technology and operational trends that will help corporate IT organizations deliver better business outcomes via the optimal use of technology.

LastPass Breached Again. Is This a Trend?

LastPass has been breached. Again. For at least the third time now since 2011. At what point is something an anomaly and at what point is it a trend?

Ten Top-Paying Tech Security Jobs

According to a new analysis of Dice salary data, the need for security professionals has translated into salaries for certain tech professionals that greatly exceed the baseline for tech-pro salaries.

Related IT Downloads

Global13-190x128.jpg Considerations for Identity Management in Public Safety Networks

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...

Mobile45 Vetting the Security of Mobile Applications

The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...

mobile30-290x195 Guidelines on Mobile Device Forensics

This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...

HealthCare01 Wi-Fi Enabled Healthcare

This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings.

...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date