Mobile

Mobile | News, how-tos, features, reviews, and videos

security threats and vulnerabilities
business travel / airport terminal walkway / traveller

An outsider in a group of professionals / questions marks overlay

Why is everybody talking about 6G?

We're not even using 5G yet, and already 6G is in the news. What is 6G? Is it real? When do we all get it? (Spoiler alert: Nonexistent, no and a long time from now.)

location data tracking iphone

Why Apple beats Google in the smartphone 'radar wars'

Apple and Google each rolled out new phones with innovative radar technologies. Google's is cooler, but Apple's is world-changing. Here’s how they compare.

4g versus 5g horizon sunrise

Why 5G means new business models and user benefits

5G wireless technology will enable business opportunities that will bring new services and better performance that extend beyond the smartphone.

endpoint security hacker vulnerablility secure mobile security app

Will 5G increase mobile security?

We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.

apple iphone 11 smartphone 2020 by apple

How the iPhone 11’s U1 chip will change everything

Apple is bringing ultra-wideband capabilities to its iPhone 11 -- and it promises to be a game-changer (eventually) for everything from healthcare to smart cities thanks to its location accuracy, reliably and security.

abstract laptop showing wireless internet connection

Don’t be blinded by 5G: Why you can’t neglect Wi-Fi 6

As important as 5G is for smartphones and other devices, don't overlook an equally important next-generation wireless technology -- Wi-Fi 6.

alexa virtual assistant echo amazon alexa voice control

How to make voice technology a business tool

Voice technology brings a number of opportunities, but there are also challenges to overcome –- security being the big one.

google chromebook in the enterprise buildings city getty images google

Will Chromebooks rule the enterprise? (5 reasons it may)

Google schooled Apple and Microsoft in the education market by growing market share from zero to 60 in eight years. Insider Pro columnist Mike Elgan examines whether Google can do it again in the enterprise.

mobile security threat detection

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

ios13 hero 03

How to create a mobile policy for iOS devices

When developing a mobile policy for iPhones and iPads, it’s important to keep in mind that from an EMM perspective, Apple’s biggest goal ( beyond privacy) is delivering a single seamless iOS experience.

cloud

Your guide to using iCloud in business

A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.

5g 4g wireless speed wireless network devices

When should enterprises move to 5G?

Maybe not today and maybe not tomorrow, but eventually everyone will be on 5G. However, before rushing to implement it in your business be sure to know what the available benefits are and which types of users will notice a real...

google android pixel 3 smart phone purple

How to create a mobile policy for Android devices

Android has become a viable enterprise platform and in some ways is beating Apple in terms of enterprise functionality. This means that IT departments supporting Android devices need to create and implement effective policies.

CIO | Middle East  >  Mobile computing / smartphone / remote worker / digital nomad / BYOD

How to develop a mobile policy

Why you need to sweat the details and avoid a far-reaching (too broad) policy when it comes to managing mobile devices.

5G mobile wireless network technology emerging from smartphone

Privacy by design: Cybersecurity and the future of 5G

History has shown that when we rush to expand computing power and interconnectivity – IoT and cloud tech, to name two – we expose ourselves to new kinds of cyberattacks and bad actors. Can we get it right with 5G?

4g versus 5g horizon sunrise

Apple vs. Huawei: Who can dominate 5G?

Apple is attempting to get US backing as our country’s champion against Chinese 5G/6G dominance – and that country’s effort to take tech market leadership away from the US. But Apple is the wrong company to do this, both from a...

5g wireless mobile data connection

Why 5G will be disruptive

With more spectrum and friendlier small cell regulations, 5G will have the wind at its back.

wireless security vulnerability

5G and 6G wireless technologies have security issues

5G and 6G wireless network technologies promise faster speeds and greater reliability, but they have security issues that must be addressed before they launch, researchers say.

Load More