Learn about both mobile device and client virtualization and how these technologies can help enterprises better manage the bring-your-own-device phenomenon.
Learn how Inova Health System in Northern Virginia will use the $100,000 gift to fund mobile technology in the Telestroke and home health programs, and to improve physicians' in-patient productivity.
Learn about Cellcrypt's new full-duplex voice encryption solution for BlackBerry smartphones on CDMA networks.
New survey results from ISACA find that IT leaders believe that bringing employee-owned mobile devices into the enterprise is risky business--but that it's worth it in the long run.
Get the specs on TabletKiosk's new Sahara Slate PC, which can handle everything from inventory management to point-of-sale applications.
The battle for mobile security must be fought on several fronts, including at the device and the network levels.
Read up on Zenprise's Secure Mobile Gateway, which provides multilayer protection against blacklisted and malicious applications.
How can IT leverage mobile virtualization on smartphones and tablets to enable road warrior and telecommuter productivity?
Learn how mobilEcho allows iPad users to securely access enterprise file servers--and skip risky workarounds that may violate IT policies.
Find out how you can take control of both corporate-liable and employee-owned mobile devices with Smith Micro's highly scalable device management solution.