Mobile technology

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Migration pains cause businesses to buy custom support for Windows XP OS

    Although Windows XP support ended on 8 April 2014, some large businesses are still running the Microsoft operating system (OS)

  • East Kent Services deploys Citrix virtual desktop

    East Kent Services has issued Citrix mobile workspace technology to organisations to reduce operational cost and increase collaboration

  • Mobile Expense Management

    Managing mobile costs is a challenge for all organisations, especially as responsibilities and budget authority often sit in several places—IT, finance, personnel, managers and, of course, the employees themselves. This situation becomes even more complex and problematic for those organisations that span more than one country or have to use multiple suppliers within one country. Getting to grips with these costs in a way that does not undermine the value of mobile flexibility is paramount, and organisations need to gather sufficient detail to effectively manage and analyse their mobile costs. Organisations need to get a grip of mobile spending. Trends such as BYOD might be leading to a reduction in capital expenditure, but there are operational communications, software and security costs and many will be growing. Increased use of mobile to extend and improve business processes should not be inadvertently restrained, but no budgets are limitless.

  • CW500: IT governance in the era of "shadow IT" – Be2Change Consultancy

    In this CW500 Club video, Christoph Burtscher, CEO, Be2Change Consultancy, talks to Computer Weekly editor in chief Bryan Glick about the challenges of IT governance in an era of shadow IT.

  • BlackBerry to buy anti-phone tapping specialist Secusmart

    BlackBerry to buy German voice and data encryption supplier Secusmart for an undisclosed sum

  • Joanna Shields joins the government’s digital revolution

    Chair of Tech City UK, Joanna Shields is joining the prime minister’s Digital Taskforce to represent the digital sector

  • Sleeping Android: the danger of dormant permissions

    A weakness in the permissions architecture of the Android platform means that apps could gain access to functionality without a user’s knowledge or consent, leaving them open to exploitation or abuse by attackers. Changes to the way the Android platform authorises permission requests could compromise the security of unwary users.

  • Isle of Man gets 4G LTE service

    Huawei teams up with local incumbent Manx Telecom to deploy the Isle of Man’s first 4G LTE service

  • 5G network for London by 2020, says Boris Johnson

    Mayor Boris Johnson to promise 5G mobile network for London by the end of the decade

  • Belt and braces: covering all the endpoint security angles

    Given users have skipped beyond the safe confines of wholly owned and heavily guarded corporate networks, how do you keep data safe?

  • VIEW MORE ON : Smartphone
  • Migration pains cause businesses to buy custom support for Windows XP OS

    Although Windows XP support ended on 8 April 2014, some large businesses are still running the Microsoft operating system (OS)

  • East Kent Services deploys Citrix virtual desktop

    East Kent Services has issued Citrix mobile workspace technology to organisations to reduce operational cost and increase collaboration

  • Understanding the hard ROI of BYOD

    To the untrained observer, the concept of BYOD is simple: bring in consumer devices and save money. However, this is often based on the incorrect assumption that device costs constitute a significant portion of enterprise mobility spend. In reality, the device cost typically makes up less than 10 percent of a company’s annual mobility spend compared to voice and data, support costs, developer costs, and management software. In return, the challenges of BYOD can increase the other 90 percent of spend to the point where BYOD will actually increase overall costs without providing any tangible benefits.

  • CW500: IT governance in the era of "shadow IT" – Be2Change Consultancy

    In this CW500 Club video, Christoph Burtscher, CEO, Be2Change Consultancy, talks to Computer Weekly editor in chief Bryan Glick about the challenges of IT governance in an era of shadow IT.

  • Joanna Shields joins the government’s digital revolution

    Chair of Tech City UK, Joanna Shields is joining the prime minister’s Digital Taskforce to represent the digital sector

  • How to configure Mac OS X Server

    In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. These functions range from simple password protection and patch management through to full-disk encryption. However, these are not the only security functions available. Indeed, OS X has a whole security and management infrastructure available for administrators called Managed Preferences, which can be managed most easily using OS X Server.

  • Underexposed risks of public Wi-Fi hotspots

    All is not always as it appears when users access public Wi-Fi networks via seemingly authentic and trustworthy providers. This article, in our Royal Holloway Information Security Thesis series seeks to raise awareness of the underexposed risks for identity and data theft by exploring the status quo and potential developments for minimising those risks.

  • British Legion launches online WW1 remembrance database

    The Royal British Legion is launching an online database to remember those killed in the First World War

  • Carl Dawson to become IT director at M&S

    Marks and Spencer hires ex-Tesco internet retailing lead as IT director

  • Contactless card payments to be accepted across entire TFL network

    Transport for London (TfL) will begin accepting contactless card payments from 16 September 2014.

  • VIEW MORE ON : Laptop
  • Migration pains cause businesses to buy custom support for Windows XP OS

    Although Windows XP support ended on 8 April 2014, some large businesses are still running the Microsoft operating system (OS)

  • East Kent Services deploys Citrix virtual desktop

    East Kent Services has issued Citrix mobile workspace technology to organisations to reduce operational cost and increase collaboration

  • CW500: IT governance in the era of "shadow IT" – Be2Change Consultancy

    In this CW500 Club video, Christoph Burtscher, CEO, Be2Change Consultancy, talks to Computer Weekly editor in chief Bryan Glick about the challenges of IT governance in an era of shadow IT.

  • Joanna Shields joins the government’s digital revolution

    Chair of Tech City UK, Joanna Shields is joining the prime minister’s Digital Taskforce to represent the digital sector

  • Enabling the secure use of RFID

    UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients. Before its full potential can be exploited, it is critical that security surrounding its use is effectively implemented to ensure the data itself is not exploited

  • Isle of Man gets 4G LTE service

    Huawei teams up with local incumbent Manx Telecom to deploy the Isle of Man’s first 4G LTE service

  • 5G network for London by 2020, says Boris Johnson

    Mayor Boris Johnson to promise 5G mobile network for London by the end of the decade

  • Belt and braces: covering all the endpoint security angles

    Given users have skipped beyond the safe confines of wholly owned and heavily guarded corporate networks, how do you keep data safe?

  • Security Think Tank: Bring your own device

    With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading industry experts on Computer Weekly’s Security Think Tank panel, offer some answers.

  • BYOD – who carries the can?

    Balancing the costs, risks and benefits of bring your own device (BYOD) There is a trend among employees to want to use their personal choice of mobile device in the fulfilment of their work commitments. While this appears to bring many benefits for the employee to select their preferred device or devices and, on the face of it, reduces upfront costs for their employer, it does introduce significant on-going costs and risks for the organisation. However, with many appealing mobile consumer devices being offered, the trend is likely to increase, so organisations need to work out suitable strategies and policies to manage this complex and hybrid situation in the best interests of both themselves and their employees

  • VIEW MORE ON : Tablet
  • Channel 4 Grand National app lets punters track horses

    When Channel 4 won the rights to screen the Grand National it decided to use mobile to take the mystery out of the magnificent chaos of the event

  • Overview Of Near Field Communication

    This chapter from the book NFC Application Development for Android, offers an overview of NFC for Android developers.

  • East Kent Services deploys Citrix virtual desktop

    East Kent Services has issued Citrix mobile workspace technology to organisations to reduce operational cost and increase collaboration

  • Mobile Expense Management

    Managing mobile costs is a challenge for all organisations, especially as responsibilities and budget authority often sit in several places—IT, finance, personnel, managers and, of course, the employees themselves. This situation becomes even more complex and problematic for those organisations that span more than one country or have to use multiple suppliers within one country. Getting to grips with these costs in a way that does not undermine the value of mobile flexibility is paramount, and organisations need to gather sufficient detail to effectively manage and analyse their mobile costs. Organisations need to get a grip of mobile spending. Trends such as BYOD might be leading to a reduction in capital expenditure, but there are operational communications, software and security costs and many will be growing. Increased use of mobile to extend and improve business processes should not be inadvertently restrained, but no budgets are limitless.

  • Twitter share price up despite losses

    Twitter’s share price has made sharp gains despite reporting a second quarter net loss of $145m

  • CW500: IT governance in the era of "shadow IT" – Be2Change Consultancy

    In this CW500 Club video, Christoph Burtscher, CEO, Be2Change Consultancy, talks to Computer Weekly editor in chief Bryan Glick about the challenges of IT governance in an era of shadow IT.

  • CW500: IT governance in the era of "shadow IT" – Aimia

    In this CW500 Club video, John Harris, chief technology officer, Aimia, talks to Computer Weekly editor in chief Bryan Glick about the challenges of IT governance in an era of shadow IT.

  • Joanna Shields joins the government’s digital revolution

    Chair of Tech City UK, Joanna Shields is joining the prime minister’s Digital Taskforce to represent the digital sector

  • Enabling the secure use of RFID

    UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients. Before its full potential can be exploited, it is critical that security surrounding its use is effectively implemented to ensure the data itself is not exploited

  • Going mobile in financial services

    In this week’s Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.

  • VIEW MORE ON : Mobile software