BYOD and Mobile Content Management: AirWatch says, "It's all about Security."
Security is a primary business concern and a primary business expense. Ease your burden by selecting a mobile content management solution that works.
There are no sacred cows to someone who believes that consumer devices and self-service IT are the keystones of the new business model. IT Apologist Ken Hess takes on Consumerization and BYOD.
Security is a primary business concern and a primary business expense. Ease your burden by selecting a mobile content management solution that works.
Apple is the King of the Mountain in Consumer Device Kingdom. To worry about competition is just a royal faux pas.
I might have been wrong about Microsoft's tablet venture but I think we've only scratched the "Surface" with the concept.
There's a solution to "dirty" energy in our future and in our past.
To those who think that Microsoft is going to produce a tablet computer, you don't know Microsoft very well.
BYOD and working in the shadows: A mandate for change or juvenile rebellion?
Jason Perlow and I discuss the future of the datacenter in a 26-minute podcast.
Siri is an interesting concept but for getting real work done, Tap & Speak beats it--hands down.
Can't decide on a BYOD management suite? This list will put you on the fast track to finding the one that's right for you.
Android is the Great Green Hope for end user Linux devices. Android and BYOD are perfect mates.
My dreams of an all BYOD-enabled world came crashing down along with my Internet access. I realized that there's gold in those data charges.
The keystone for any successful BYOD program is a management suite. Without one you will fail.
There's money to be made on Facebook's IPO but is it a long-term investment? I don't think so but there's much to consider.
If you need complete control over a publicly-accessible iPad, MokiMobility is your answer. You won't believe it until you see what it can do for you.
A lot of companies have chosen to blacklist certain Apps. The question is, "Does it do any good?"
Bring Your Own Device
The second most important BYOD security defense: user awareness
Apple
Tech & Work
Security
Mobility