Portal:Mobile Enterprise
From Wikibon
Line 1: | Line 1: | ||
+ | <meta name="description" content="The Wikibon Mobile Enterprise Technology Portal contains mobile enterprise industry research, articles, expert opinion, case studies, and mobile enterprise related company profiles." /> | ||
+ | <meta name="title" content="Mobile Enterprise Technology Portal" /> | ||
+ | |||
+ | The Wikibon Mobile Enterprise Technology Portal contains mobile enterprise industry research, articles, expert opinion, case studies, and mobile enterprise related company profiles. | ||
+ | |||
__NOTOC__ | __NOTOC__ | ||
{| | {| | ||
Line 23: | Line 28: | ||
</p> | </p> | ||
[[Architecting wireless email | read more...]] | [[Architecting wireless email | read more...]] | ||
- | |} | + | |}[[Category:Mobile Enterprise Wikitips]][[Category: Wikitips]] |
Revision as of 18:55, 17 September 2009
The Wikibon Mobile Enterprise Technology Portal contains mobile enterprise industry research, articles, expert opinion, case studies, and mobile enterprise related company profiles.
WikitipApple control freak approach discouraging application developersDespite the appearance of the Apple AppStore, many leading mobile application developers have not launched products for the iPhone/Touch. They have two important concerns about the iPhone platform: First, while it has a blow-away appearance, its underlying capabilities are actually much simpler than the WinMobile or even Palm platforms, making it difficult to replicate advanced features; and second, because the Appstore is the only retail outlet for iPhone applications, Apple has huge power over third-party software suppliers. It has already shown that power by denying access to the store to at least one vendor because its application had functionality similar to a product from Apple. This iron control, which is typical of Apple, may be opening the door to Android, which has finally reached the market with a much more technically advanced platform and an open source mentality. Organizations should evaluate the capabilities of both the base platforms and available software before choosing a corporate standard mobile device. |
Featured Case StudySafeguarding Enterprise Voice Communication over WiFiEnterprises are showing a strong interest on wireless voice technology over the standard WiFi networks for its attractive features such as lower phone bills, centralized management, or fast deployments. However these wireless voice networks are susceptible to usual attacks like viruses, spam, phishing, hacking, stolen data, denial of service (DoS), voice injections, man in the middle attacks, call hijacking, eavesdropping etc. The security of these networks become a major concern for enterprises because IT managers have no or very little knowledge how to protect voice networks. |
|
Featured How-To Note |
Architecting Wireless EmailWireless email is an important business tool for today's enterprises and an entrepreneurial solution to maximize the employees’ business potential and gain a competitive edge. Since businesses now send as much as 60% of their business-critical data via email, accessing emails wirelessly means business success for many organizations by providing rapid customer communication, faster decision-making and collaboration from distant places. |