dcsimg

Mobility

Articles

Top Mobile Application Management (MAM) Tools for the Enterprise in 2019

In some cases, mobile application management functionality is delivered in standalone MAM platforms. In others, it comes as a module in a broader suite of services. In either case, the tasks MAM performs are vital. More >

Mobile Application Management and the Enterprise

Mobile application management (MAM) focuses on supporting what is sent to and resides on the mobile device. Enterprises rely on MAM for a balance of security and functionality. More >

What's in Store for Mobile Enterprise Security in 2019

How is 2019 shaping up? Not surprisingly, it is destined to present a characteristically scary array of potential problems in mobile enterprise security. More >

Mobile Workers Will Begin Gaining 5G Access in 2019

Consumers and enterprises have been hearing a lot about 5G for a few years. The development curve has accelerated. More >

Qualcomm vs. FTC, Apple and Intel: Deceptions and Misdirection

The FTC got involved in litigation at the request of Apple and Intel, which could backfire on them. The effect on Qualcomm and the smartphone market may not be what they intended. More >

Enterprise Mobile Management Trends in 2019

The largest share of the focus of mobility during the past decade has been on technical issues. How can IT departments securely support an increasingly mobile and dispersed enterprise work force? More >

More Articles >

Interviews

Startup Develops Wearable Aimed at Preventing Assaults on Women

The wearable device can be activated to sound an alarm and send out a location-based text alert in the event of an attempted assault.

More >

Where Is the Will to Use GPS Technology to Help Protect Kids?

There isn’t enough consumer interest for GPS technology to help safeguard kids.

More >

Appster Exec Shares Insights on Smartwatch Prospects

An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.

More >

More Interviews >

Most Popular Features

Time to Set Realistic AI Expectations Is Now

The gap between what senior business execs believe can be accomplished by investing in AI and what can be really accomplished using AI has widened to the point where a backlash against AI in the enterprise may be all but inevitable.

Now Comes the Hard Part of Cloud Computing

Given all the complexities involved, it is little wonder that so many organizations have found moving to the cloud a much bigger challenge than they might have originally anticipated.

Why Security Needs to Automate, Too

The same tools being used to augment the development and operations side of the house can also be applied to automation in security.

Editor's Choice
Related IT Downloads

Healthcare2 Health Attitude: Unraveling and Solving the Complexities of Healthcare

In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing an...

Global13-190x128.jpg Considerations for Identity Management in Public Safety Networks

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...

Mobile45 Vetting the Security of Mobile Applications

The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...

mobile30-290x195 Guidelines on Mobile Device Forensics

This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...

More IT Downloads>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.