Editors' Picks
-
The state of mobile device backup
With the growing bring-your-own-device movement, backing up data on mobile devices is quickly becoming an issue for most companies.02 Aug 2013
-
Aberdeen releases new flash NAS; NAND flash revenue on the rise
Storage hardware vendor Aberdeen releases new flash NAS; plus, NAND flash revenue is on the rise, according to a recent report from IHS iSuppli.26 Jul 2013
-
Google Ventures team member talks mobile disruption at MassTLC
What does mobile disruption mean for SMBs? Learn what Google Ventures' Rich Miner had to say at this year's MassTLC Mobile Summit.12 Jul 2013
-
BB10 security: The risks of running Android apps on BlackBerry 10
Expert Michael Cobb explains the implications of running Android apps on BB10 and the system's new security features, including Balance.21 Jun 2013
-
IPhone vs. Android backup
Eric Slack of Storage Switzerland compares iPhone and Android backup in this Expert Answer.30 May 2013
-
Common use of mobile devices makes case for strong BYOD management
Considering the constant connectivity of today's employees, organizations would be well-served to examine their BYOD policy.07 May 2013
-
Making mobile BI applications a reality: Key steps to take
In a podcast, BI expert William McKnight discusses best practices and action items for managing deployments of mobile business intelligence tools.03 May 2013
-
As BI mobility takes off, don't get left behind -- or unprepared
Deployments of mobile business intelligence tools are spreading rapidly. Before you take the mobile BI plunge, read advice on how to make it work.18 Apr 2013
-
Android versus iOS in the enterprise: A whole new ballgame in 2013
Android has taken steps to address its poor security reputation. These improvements will help Android compete against iOS in the enterprise.01 Apr 2013
-
Penn Medicine takes three-pronged approach to BYOD management, security
Penn Medicine considers best practices for implementing and managing mobile devices, specifically BYOD devices, in this case study.18 Mar 2013
-
Health care ripe for near field communication technology
Special interest group formed by NFC Forum sees potential in widespread mHealth uses for new tech embedded in smartphones.12 Mar 2013
-
Tip: Use BYOD policies to integrate personal devices securely
The use of personal devices in healthcare continues to flourish. Consider security and BYOD policies when you integrate tablets and smartphones.11 Mar 2013
-
Mobile business intelligence applications: Not just a pretty interface
Back-end factors such as network performance and server hardware are key elements of building an effective mobile business intelligence architecture.08 Mar 2013
-
Growing use of mobile BI apps sparks need to downsize designs
Mobile business intelligence adds new challenges for BI teams, especially in designing apps. Don't overdo it on data, say BI managers and analysts.08 Mar 2013
-
Latitude 10 Dell tablet takes on iPad's health care stranglehold
While the iPad might have mind share in health care, the Dell tablet runs native Windows software, adds biometric and smart card authentication.25 Feb 2013
-
How users can defend against the Android remote-wipe vulnerability
Expert Nick Lewis details the Android remote-wipe vulnerability targeting Samsung phones and provides mitigations for Android users.22 Feb 2013
-
Security, data usage policies must-haves for mobile app management
Making corporate data available on mobile devices calls for careful management to keep business users from going down wrong paths in using the info.15 Feb 2013
-
McGraw's mobile app security strategy: Three legs of 'trusted on busted'
Struggling to define your mobile app security strategy? Gary McGraw offers a manifesto to help get infosec and app developers on the same page.13 Feb 2013
-
Building mobile cloud applications for the BYOD workforce
As BYOD becomes a primary concern for enterprise IT, creating mobile cloud applications that support the evolving workforce is paramount.31 Jan 2013
-
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company.28 Jan 2013
Security Management Strategies for the CIO