Mobile
Follow IW:
 March 15, 2016

TOP STORIES

9 Free iPhone Apps To Help You Land Your Next Job
Whether you're on the hunt for greener pastures, or looking for a complete career change, online resources are plentiful. Here are 9 iOS apps that could improve and shorten your search.
Microsoft Tests Bluetooth App That Unlocks Windows 10
Microsoft is beta testing a Bluetooth app designed to unlock your Windows 10 computer using your phone. The move is the latest by a tech titan to eliminate the dreaded password.
Google Releases Android N Developer Preview
With a surprise early release, Google hopes developers will provide more feedback and have more time to implement new Android features.
Galaxy S7 Parts Cost $255, IHS Reveals
Samsung's metal-and-glass Galaxy S7 smartphone costs as much to build as the plastic Galaxy S5 did back in 2014, according to research firm IHS.
Patent Hints At Apple Watch Morphing Into Medical Device
An Apple patent made public recently points to potentially larger plans for the iconic computer and device maker's Apple Watch. The wearable may eventually offer capabilities of a medical device.

Are you prepared for a new world of enterprise mobility? Attend the Wireless & Mobility Track at Interop Las Vegas, May 2-6. Register now!


Security Spotlight

Obama At SXSW Highlights Encryption, Government-Tech Divide
At the heart of the FBI's struggle with Apple is an us-versus-them sentiment that President Obama may be softening -- by reframing "government problems" as problems for the nation's greatest problem solvers.

TECH RESOURCES

ACCESS TECH LIBRARY NOW

  • [UX] How to Deliver the Best App Experience to Users

    Attend this webinar to learn how to gain a competitive advantage by delivering the very best user experience with improvements based on actual application performance, including mobile, mainframe, on-premises infrastructure, the cloud, and user feedback.

  • [Security] Identity & Behavioral Biometrics

    Despite millions spent each year on security, breaches still persist thanks to the compromised user credentials. How can you make the most of your existing security investments, while ensuring those who access your network are who they say they are?

MORE WEBINARS

MOST POPULAR

SLIDESHOWS

9 Hot Big Data And Analytics Startups To Watch

MORE SLIDESHOWS

FEATURED REPORTS

MORE REPORTS
InformationWeek is looking for engaged readers to moderate message board on this site. Interact with your IT peers; earn recognition and perks. Interested? Email:Iwkmoderator@ubm.com

CURRENT ISSUE

DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS
InformationWeek Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future InformationWeek Mobile Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: InformationWeekMobileWirelessReport@ubmtechcontent.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.