New & Notable

Get Started

Simplify mobile app development for the enterprise

Without the right resources, mobile app development can be challenging. Find out how to start the process and the best tools to streamline the app dev journey.

Evaluate

4 types of mobile security models and how they work

Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security.

Evaluate

The ultimate guide to mobile device security in the workplace

Mobile devices provide connectivity for employees to access business data and communicate with colleagues, but these unique benefits come with specific security challenges for IT.

Manage

Top 4 mobile security threats and challenges for businesses

Mobile devices are a target for hackers, with several ways to steal data. These threats -- from network spoofing to phishing texts -- endanger organizations as much as individuals.

Find Solutions For Your Project

Mobile Computing Basics

  • Get Started

    4G (fourth-generation wireless)

    4G is the short name for fourth-generation wireless, the stage of broadband mobile communications that supersedes 3G (third-generation wireless) and is the predecessor of 5G (fifth-generation wireless).

  • Get Started

    GPRS (General Packet Radio Service)

    GPRS (General Packet Radio Service) is a best-effort packet-switching protocol and standard for wireless and cellular network communication services.

  • Get Started

    Simplify mobile app development for the enterprise

    Without the right resources, mobile app development can be challenging. Find out how to start the process and the best tools to streamline the app dev journey.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Mobile Computing

Networking
Unified Communications
Security
Close