Smartphones

Enterprise Data Mobilization: Part 3

12/17/2009
In Parts 1 and 2 of this series we explored the steps to take to mobilize enterprise data and application design considerations. In this installment, we explore the next steps in the implementation process, including client-side caching, coding business logic, and building the user interface.

Google Phone: 5 Things To Know

12/15/2009
Are rumors of a Google-branded, carrier-agnostic smartphone mere media frenzy, or a sign of impending doom for wireless carriers?

15 Most Common Data Breach Attacks

12/15/2009
Remote access is the primary pathway to corporate data breaches, while wireless networks are the least likely path of intrusion, according to a new study.
 |<  <  282 283 284 285 286 287 288 289 290 291  >  >| 

MOST READ STORIES

Must See


FEATURED REPORT

From Mobile First to Mobile Productivity

Logic would lead to the conclusion that utilizing a mobile first strategy—designing experiences for mobile devices and processes, with the mobile user in mind—would automatically lead to mobile productivity, but that is not the reality. Here are the critical things needed to take mobile productivity to the next level.