Editors' Picks
-
What do you know about dual-persona technology?
Dual persona is fairly new, so you may not be familiar with it yet. Take our quiz to see how much you know -- and learn more -- about the technology.12 Aug 2013
-
The state of mobile device backup
With the growing bring-your-own-device movement, backing up data on mobile devices is quickly becoming an issue for most companies.02 Aug 2013
-
IT insourcing vs. outsourcing: Readers debate selective outsourcing
In this CIO Chatter, our readers respond to a recent column on IT insourcing vs. outsourcing. What are your views in the selective-outsourcing debate?11 Jul 2013
-
Introduction to iPad administration
You can use Apple Configurator and over-the-air methods to send configuration profiles to iPads, giving you more control over iPad administration.13 Jun 2013
-
Tackling iOS device management with Apple Configurator
Apple Configurator simplifies iOS device management and configuration and makes it easier for admins to prepare and supervise devices.05 Jun 2013
-
IPhone vs. Android backup
Eric Slack of Storage Switzerland compares iPhone and Android backup in this Expert Answer.30 May 2013
-
Making mobile BI applications a reality: Key steps to take
In a podcast, BI expert William McKnight discusses best practices and action items for managing deployments of mobile business intelligence tools.03 May 2013
-
As BI mobility takes off, don't get left behind -- or unprepared
Deployments of mobile business intelligence tools are spreading rapidly. Before you take the mobile BI plunge, read advice on how to make it work.18 Apr 2013
-
Mobile business intelligence applications: Not just a pretty interface
Back-end factors such as network performance and server hardware are key elements of building an effective mobile business intelligence architecture.08 Mar 2013
-
Growing use of mobile BI apps sparks need to downsize designs
Mobile business intelligence adds new challenges for BI teams, especially in designing apps. Don't overdo it on data, say BI managers and analysts.08 Mar 2013
-
Apple VPP makes it easier to buy iOS business apps
The Apple Volume Purchasing Program lets organizations buy public iOS business apps for employees who use iPhones and iPads for work.22 Feb 2013
-
Mitigations for mobile phishing problems on the iOS platform
With potential phishing problems surfacing for iOS users, expert Nick Lewis provides advice for enterprises facing the mobile phishing menace.18 Feb 2013
-
Security, data usage policies must-haves for mobile app management
Making corporate data available on mobile devices calls for careful management to keep business users from going down wrong paths in using the info.15 Feb 2013
-
McGraw's mobile app security strategy: Three legs of 'trusted on busted'
Struggling to define your mobile app security strategy? Gary McGraw offers a manifesto to help get infosec and app developers on the same page.13 Feb 2013
-
What risk does the Apple UDID security leak pose to iOS users?
Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak.12 Feb 2013
-
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company.28 Jan 2013
-
BYOD security: How to remotely wipe iPhone and Android devices
Remote data wipe is key to any BYOD security policy, but each OS handles it differently. Lisa Phifer covers how to use it with other controls to protect data.10 Jan 2013
-
Mobile enterprise technology news from CES 2013
Amidst the sea of TVs, cars, robots and vacuums, wireless carriers and hardware makers made some important enterprise technology news at CES 2013.10 Jan 2013
-
Tech evolution: IPhones, wall calendars and human hosts
The iPhone is but one example of tech evolution creating a 'new normal.' What's next? Think human smartphones and embedded apps.04 Jan 2013
-
Three desktop virtualization trends that won't go away in 2013
Gabe Knuth shares more of his favorite desktop virtualization trends from the past year -- and these won't be leaving the forefront anytime soon.31 Dec 2012
Security Management Strategies for the CIO