MDM/MAM

MDM/MAM news, trend analysis and opinion

security
fiberlink wipedevice2

Going rogue

A quick drive around Washington DC found 15 rogue cell phone towers.

ipad

The must-have iPad office apps, round 9

Google's newly completed Apps suite just can't beat Apple's iWork or Microsoft Office

mdm
Clear Choice Tests

Review: Citrix Xen Mobile rates a spot on your MDM short list

XenMobile 9.0 delivers topnotch features, granular security policies.

13 Android Tools for Web Developers

Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done, anywhere.

13 ways to optimize your Android smartphone

Make your Android phone more powerful, useful, and efficient with these 13 quick tips

11 offbeat battery chargers: Portable power with a twist

There's no need for a portable phone charger to be boring -- here are 11 chargers for your smartphone (or tablet) that are both useful and creative.

First look: Android L in action

The new Android version comes with a UI refresh, not new features alone

Watch out for these smartwatches

With Apple expected to launch an iWatch in October, other vendors including Samsung, LG and Motorola, are getting a headstart with smartwatches in varied shapes and colors.

Biggest, baddest, boldest software backdoors of all time

These 12 historically insidious backdoors will have you wondering what’s in your software -- and who can control it

Put your NFC-enabled smartphone to work

As NFC proliferates on new smartphones, we're entering the era of touch-and-go business.

Samsung introduces Tizen smartphone, with a Tizen TV next year

Samsung introduced Monday its first smartphone built around the Tizen operating system, with a TV running the OS planned for next year.

Backlash over Facebook's 'listening' feature is a problem of trust

Facebook will soon be listening to its users -- literally -- but some of them wish it would cover its ears.

Global mobile roaming hub accessible from the Internet and vulnerable, researchers find

The GPRS Roaming Exchange (GRX) network, which carries roaming traffic among hundreds of mobile operators worldwide, contains Internet-reachable hosts that run vulnerable and unnecessary services, recent security scans reveal.

10 Google Glass Etiquette Dos and Don'ts

There's not necessarily a right or wrong way to use Google Glass, but there are certainly smart and not-so-smart ways. CIO.com's own Glass Explorer Al Sacco shares 10 Glass etiquette dos and don'ts.

New attack methods can 'brick' systems, defeat Secure Boot, researchers say

The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.

island

3 Ways to Manage Corporate Digitization

Single digital executive or digital islands? It's time to choose an approach that fits your corporate strategy, according to research by the MIT Center for Information Systems Research

Sprint union with T-Mobile reportedly a done deal

Deutsche Telekom has agreed to an offer for Japanese mobile and broadband company SoftBank to buy T-Mobile USA, according to a news report.

Vessel-tracking system vulnerable to denial-of-service, other attacks, researchers say

Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers.

Load More