Topic:

Mobile Device Management (MDM) and BYOD

Latest Headlines

Latest Headlines

Spotlight: Here's a lesson we can learn from 'Shadow IT'

Why exactly are we blaming employees for doing what they need to do to get work done?

Samsung announces invention of existing 5x Wi-Fi technology

It's an amazing new system that utilizes multiple antennas to steer transmissions between broadband modems, TVs, PCs and smartphones. Haven't we done this story before? Nah, let's lead with it anyway.

Proliferation of small cells could overcrowd networks, say NFV experts

At the rate current backhaul networks are currently evolving, the bandwidth required by devices roaming between small cells and macro cells could overwhelm their control systems.

Red Hat's FeedHenry buy puts a JBoss hat on different mobile platform

Choosing a mobile application development platform is an "either/or" deal, for various architectural reasons, and FeedHenry had been an attractive "or" against Red Hat's "either."

Microsoft Azure now provides back-end support for.NET apps on Android, iOS

If Windows Phone's market share never exceeds 10% again, it might not make much difference. Microsoft is building out its revenue platform for mobile services anyway, whether or not Windows plays a role.

IDC: The return of 4GLs to compete against both Web and native

A new cloud-based rapid apps development platform may make enterprises reconsider their stance on whether HTML5 and native code are the only two ways to go.

Ponemon: Infosec pros focusing more on protecting info than technology

Read that headline again, because it's meant to be good news. Governance strategies advise businesses to focus on protecting information and helping people.

Spotlight: They're not really 'back doors' if Apple gives them brass knockers

Last Monday in Spotlight, I pointed you toward an article from the personal blog of security researcher Jonathan Zdziarski, who reported on the existence of several exploitable back doors around security features in Apple's iOS.

Spotlight: iOS 7 remains wide open to exploits, says researcher

Among the many things Apple is notorious about not telling people is the architecture of its iOS system services. While on the surface you'd think Apple is operating in the best interests of security, what this means is that an active open source movement has germinated with the explicit goal of ferreting out ways to establish rootkits and other exploitative, stealth services on iPhones and iPads. 

Ping takes a swing at replacing passwords with mobile devices

The system Ping Identity has been building (and to some extent, acquiring) to let people log onto services with their mobile phones is now ready for public launch.