Last week, I finally received my Apple Watch. I plan to write a number of related Watch tips and tricks stories, and I like to be able to provide visual aids in my posts whenever possible, so one of the first questions I asked myself was, How do I take a screen shot on the Apple Watch?
Running late for a meet up with friends or an appointment? Share a location securely and for a limited time period with smartphone application Glympse. It's a free download for Android, iOS, Windows Phone and BlackBerry.
Apple hopes to bolster its position in the enterprise mobility management (EMM) market in September with its new iOS 9 software, which packs key features and overdue enhancements for IT administrators. Apple's Volume Purchase Program (VPP), a specialized App Store and service that lets businesses purchase software licenses in bulk and then distribute apps to multiple users, will soon give admins more options to install, update and remove business apps.
After traveling all day, the last thing you want to do is wait in a long line to check into your hotel. And when you finally get to the front desk, it seems like the hotelier has to type a million keystrokes into the computer before finally handing you your room key.
Many social media apps have features that show up when you swipe in different directions, or functionality that isn't visible at first glance. But Snapchat might have ‘em all beat because it has a handful of hidden features and gestures that are only discovered through frequent usage or word of mouth. Frequent users of Snapchat may have noticed several places within the app that display numbers and emoticons, but most people either don't know these features exist or don't know what they mean.
Apple's budding partnership with IBM culminated in the release of AppleCare for Enterprise, the company's business-specific support service, but for the vast majority of organizations that use Apple products the initiative is nothing more than a glorified Genius Bar. CIOs and IT professionals welcome Apple's recent interest in the enterprise, but many are still unclear on the levels of support and services the consumer giant offers -- and few are satisfied with Apple's commitment.
The risk of data loss and security breaches from mobile computing is substantial, whether it’s lost devices, hackers gaining entry via mobile employees or the steady stream of new threats coming out. The good
news is that organizations can still reap the benefits of mobile computing by combining sound security policies with end user training, intelligent device selection and by taking steps to secure their most valuable data.