Computerworld

Computerworld Mobile/Wireless Computing

July 11, 2019

Image: 4 big, fat, pesky problems with Android Q gestures

4 big, fat, pesky problems with Android Q gestures

Here's hoping Google gets 'em fixed before Q gets finalized. Read more ▶

Your Must-Read Stories

•

How to use your iPad as a second Mac display with Sidecar

•

One day you’ll wear your Mac like sunglasses

•

The big picture on Apple's vision for computer vision in iOS 13

•

Message to IT: Trusting Apple and Google for mobile app security is career suicide

White Paper: Smarsh

Texting & Compliance: Why Compliance Officers Should Say "Yes" To Text

Your millennial customers and workforce rely on their mobile devices for communication. Enable them to be more productive and responsive, while meeting your firm’s compliance requirements. Read more ▶

Image: How to use your iPad as a second Mac display with Sidecar

How to use your iPad as a second Mac display with Sidecar

Using macOS Catalina and iPadOS Sidecar mode, you can turn your iPad into a secondary display. Here's how to do it. Read more ▶

Image: Productivity Hack: Why You Should Ditch Your Stock PDF Reader for PDFpenPro

DEALPOST

Productivity Hack: Why You Should Ditch Your Stock PDF Reader for PDFpenPro

Fill out forms, add signatures, and more with this innovative tool. Read more ▶

Image: One day you’ll wear your Mac like sunglasses

One day you’ll wear your Mac like sunglasses

What happens when your AirPods become your primary connection with all your computers? Read more ▶

 
 
Image: The big picture on Apple's vision for computer vision in iOS 13

The big picture on Apple's vision for computer vision in iOS 13

Apple is developing computer vision AI every developer should take a look at. Read more ▶

Image: Message to IT: Trusting Apple and Google for mobile app security is career suicide

Message to IT: Trusting Apple and Google for mobile app security is career suicide

Ready for the mobile security news that IT doesn't want to hear about but needs to? When security firm Positive Technologies started pen testing various mobile apps, security holes were rampant. Read more ▶

White Paper: Quest Software

Best Ways to Extend Endpoint Management and Security to Mobile Devices

This paper examines the reasons for incorporating mobile device management (MDM) into endpoint management. It explores how IT admins can execute four administrative functions – enroll, take inventory, configure and secure – for mobile devices as they do for traditional devices. Readers will take away a better understanding of how to fit enterprise mobile management into their existing strategies for endpoint management. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to Computerworld Mobile/Wireless Computing as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.