BlackBerry Enables the Enterprise of Things to Thrive with Enhanced Mobile-Security Platform
With an estimated 20.8 billion connected devices by 2020, the Internet of Things (IoT) is transforming how we live, and the Enterprise of Things...
Worldwide Market for Used Smartphones Forecast to Grow to 332.9 Million Units with a...
A report from International Data Corporation, showed that worldwide shipments of used smartphones, inclusive of both officially refurbished and used smartphones, to reach a...
Mobile Workers Will Be 60% of the Total U.S. Workforce by 2024, According to...
According to a new forecast from International Data Corporation (IDC), the U.S. mobile worker population will grow at a steady rate over the next...
Samsung’s Bixby Voice Capabilities Now Available in Over 200 Countries Globally
Samsung Electronics announced that Bixby’s voice capabilities have expanded to more than 200 countries and territories worldwide, allowing millions of consumers to experience a...
iPhone X Available for Pre-order on Friday, October 27
iPhone X, the future of the smartphone, featuring a revolutionary new design with a stunning all-screen display, wireless charging and an incredible rear camera...
Apple’s App Store ecosystem facilitated over half a trillion dollars in commerce in 2019
Apple announced the App store ecosystem supported $519 billion in billings and sales globally in 2019 alone.
The study reveals that the direct payments made to...
Mix, Match, and Customize the Alcatel A50 Smartphone to Make It All Your Own
Alcatel is unveiling an all-new smartphone experience for TELUS and Koodo Mobile customers across Canada, with the introduction of the Alcaltel A50 and SNAPBAK...
Endor Labs: What’s Lurking in your Apps?
Endor Labs recently named cybersecurity industry veteran, Karl Mattson as the company’s first Chief Information Security Officer (CISO).
In this interview, Karl Mattson, shared insights from his...
NetMotion Provides Premium Secure Experience to Mobile Workers
There are two components to the NetMotion Software solution: 1. A secure tunnel that encrypts and optimizes all the traffic on a network 2....
Best Practices for Protecting Mobile Devices
JT Keating, SVP Strategic Initiatives of Zimperium, provided insights into the attack vectors on mobile devices, including malicious apps, network exploits, and phishing, and...















