Mobile Computing

The mobile computing section examines concepts and technology around one of the current hottest tech trends. Also see wireless networking.




Phone hacking is a widespread problem that is expected to grow with the increasing prevalence of smartphones. Fortunately, there are many...

Could Your Smartphone Be Hacked?


If you've got aching wrists, stiff shoulders or are developing a hunchback, it's time to set up an ergonomic workstation. Here are some...

Beat Injuries With These 4 Computer Ergonomics Tips


The latest in mobile development has brought several smartphone industry life cycle issues to the fore. Here are a few things that the...

5 Issues That the Mobile Device Industry Needs to Solve, Pronto


Not long ago, bring your own device (BYOD) was a hot new trend, but now it's simply a reality of modern business. Find out why BYOD has...

4 Reasons Why BYOD Is No Longer An Optional Strategy


Consumers used to expect that banks would hold their money, pay some interest and maybe provide a few services. Now we want it all remotely...

The Impact of Mobile Banking


Deleting data doesn't necessarily mean that it's permanently gone. Here are some methods for keeping your private data out of the wrong...

Never Really Gone: How to Protect Deleted Data From Hackers


Cell phone hacking has become a real concern with the widespread use of smartphones. Learn about how hackers get into your phone and what...

Common Methods Hackers Are Using To Crack Your Cellular Phone


Bring your own device (BYOD) allows employees to utilize their own mobile devices for business. While this can be extremely convenient, it...

BYOD: A Necessity for Modern Business


Bluetooth and Wi-Fi: Find out what separates these two wireless technologies.

What is the difference between Bluetooth and Wi-Fi?


This update from Google is putting a much heavier emphasis on mobile devices than ever before, meaning that many will need to adjust their...

6 Signs That Mobile Is the New Key to Winning at SEO


Wearables are being used in enterprise more than ever, so with that, one must implement proper security. An appropriate enterprise mobility...

Adopting Wearables with Enterprise Mobility Management Solutions


Much of the world seems to be moving to mobile devices, which makes mobile device management more important than ever. But how do you...

7 Tips For Selecting an Enterprise Mobile Device Management Solution


So just how safe is your data? Here we take a deeper look at the PKI technology designed to protect it.

Can Public Key Infrastructure Provide More Security Online?


We can only guess what the future of technology holds, but history suggests that if you're looking for future facts, you might just find...

Astounding Sci-Fi Ideas That Came True (and Some That Didn't)


Many factors must be taken into consideration when deciding whether to develop a native app or a mobile web app, so here we take a look at...

Native App or Mobile Web App?


If the gaming industry can deliver on the potential of some of these trends, the future looks bright.

The Most Important Trends in Gaming


Ambient intelligence is technology that surrounds you, and can affect you without you even realizing it. The rise of ambient intelligence...

The Awakening of Ambient Intelligence


With BYOD on the rise, businesses must find ways to control the data and security on devices that they may have little control over. Mobile...

Why Your Business Should Be Using Mobile Application Management


Deployments of 5G mobile communications networks are being planned around the world. The effort involves alliances of various countries,...