Good Technology is hoping its cloud-based Management Suite will help IT departments that don't want to rely on multiple vendors' products to manage the various phones and tablets employees bring to work.
The SilentText secure messaging application bundled with Blackphone had a serious vulnerability that would have allowed attackers to decrypt messages, read contact information, gather location data and even execute malicious code on...
A scathing report from the DHS accuses the U.S. border patrol of wasting more than $240 million on Predator drones with such bad planning it often lacked places to land, equipment to fix them or bad guys to catch.
Read this white paper by Kevin Craine to discover how mobile capture can improve the effectiveness of your organization's processes. Discover the top 10 questions to ask before you make your investment in mobile capture.