Computerworld

Computerworld Mobile/Wireless Computing

July 18, 2019

Image: Apple, Google, and the copycat conundrum

Apple, Google, and the copycat conundrum

"Android copied the iPhone," "iOS copied Android," and the importance of mobile tech perspective. Read more ▶

Your Must-Read Stories

•

How to take control of Face ID (with tools you may not know exist)

•

10 useful Google apps you probably aren't using

•

Alexa wins the Apple App Store as voice control takes over

•

Which iPhones, iPads support Apple's iOS 13 and iPadOS?

White Paper: Smarsh

Texting & Compliance: Why Compliance Officers Should Say "Yes" To Text

Your millennial customers and workforce rely on their mobile devices for communication. Enable them to be more productive and responsive, while meeting your firm’s compliance requirements. Read more ▶

Image: How to take control of Face ID (with tools you may not know exist)

How to take control of Face ID (with tools you may not know exist)

Face ID, though handy, isn’t always the best security option. Follow these steps to deactivate the feature on your iPhone and limit what Face ID opens. Read more ▶

Image: Productivity Hack: Why You Should Ditch Your Stock PDF Reader for PDFpenPro

DEALPOST

Productivity Hack: Why You Should Ditch Your Stock PDF Reader for PDFpenPro

Fill out forms, add signatures, and more with this innovative tool. Read more ▶

Image: 10 useful Google apps you probably aren't using

10 useful Google apps you probably aren't using

These easily overlooked Android apps are all made by Google — and they're all worth your while. Read more ▶

 
 
Image: Alexa wins the Apple App Store as voice control takes over

Alexa wins the Apple App Store as voice control takes over

Alexa's meteoric climb up the Apple App Store charts should be all the proof you need that the age of voice is here. Read more ▶

Image: Which iPhones, iPads support Apple's iOS 13 and iPadOS?

Which iPhones, iPads support Apple's iOS 13 and iPadOS?

With the arrival this fall of iOS 13 and iPadOS, there's some bad news for those relying on iPhones that debuted in 2013 and 2014 and some of Apple's older iPads. Read more ▶

White Paper: Quest Software

Best Ways to Extend Endpoint Management and Security to Mobile Devices

This paper examines the reasons for incorporating mobile device management (MDM) into endpoint management. It explores how IT admins can execute four administrative functions – enroll, take inventory, configure and secure – for mobile devices as they do for traditional devices. Readers will take away a better understanding of how to fit enterprise mobile management into their existing strategies for endpoint management. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to Computerworld Mobile/Wireless Computing as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.