TECH SPOTLIGHT

The Evil Eight: Top Mobile Security Threats

10/9/2012
Executives rank their biggest security concerns when it comes to mobile device security in the enterprise. Attacks through apps and open Wi-Fi are becoming abundant.

Mobility in Retail 2012: Application Across Verticals

9/10/2012
The mobility revolution in retail can serve as a model across verticals. This special report, produced by RIS News and Mobile Enterprise, gets to the latest on technologies that are reshaping the retailing experience and beyond.

Why Do Tablets Disrupt Sleeping Patterns?

9/3/2012
Using a tablet or mobile device with a self-luminous backlit display even before bedtime can cause you to lose sleep. The screen light makes the body clock regress from nighttime-sleepy to daytime-alert mode.

5 Reasons to Choose Rugged over Consumer

8/27/2012
While consumer devices appear to be less expensive than their rugged counterparts, total cost of ownership — functionality, product/platform life span, carrier cost — must be considered before choosing.

Top 5 Myths About Building an App

8/20/2012
Because of the rapid evolution of mobile devices and OS’s, there are many common misconceptions about building an app in the enterprise.
 |<  <  14 15 16 17 18 19 20 21 22 23  >  >| 

MOST READ STORIES

topics

Must See


FEATURED REPORT

Building an Effective Enterprise Mobility Management Toolkit

For companies without proper management tools or those that are still riding the MDM wave, it's past time for EMM. For those well versed in mobile management, it's time to take it to the next level. This report provides the roadmap for effective next-gen tools.