Mobile

March 21, 2019
The Importance of Mobile Security premium
Cell phones, tablets, wearables, and other mobile devices dominate our lives. I personally bring my trusty iPad to everywhere, and, like everyone else, have my phone with me at all times. The biggest attack surface for any enterprise, then, may well be these devices. How can we assess the threats? What are the components in […]
premium
don.maclean@dlt.com'
February 27, 2019
Public Sector Customers Quickly Deploy Apps With New Mobile Offline Capabilities from Appian premium
To view the original blog from Appian, click here. Helping our government customers design mobile apps with the best user experience and seamless integration with their current IT investments is one of Appian’s top priorities. In our 19.1 release, we’ve added some exciting new mobile offline capabilities that enable  government organizations to work with data, cases, and […]
premium
Jason.Adolf@gmail.com'
August 25, 2015
New Mobile App Makes it Easy to Handover BIM Data to Facilities Managers premium
New mobile-first solution uses BIM 360 Field data to help owners realize operating potential of their buildings BIM is great for the design and construction of buildings (and infrastructure projects) but BIM data offers just as much value to facilities managers after the project is complete. These are the people who are responsible for the […]
premium
editor@acronymonline.org'
April 10, 2013
How to Configure and Deploy a Mobile App in Minutes using FullCircle Mobile App premium
Many professionals are unaware how to troubleshoot, load, or configure their devices and will turn to their IT department for help. Doing so results in lost time, frustration, and third party assistance. Now there is a simple solution that CAD and GIS users can practice to configure their mobile apps. FullCircle Mobile App is a […]
premium
fatima.davis@dlt.com'
January 31, 2013
Mobile Malware is the New PC Malware premium
In 2004, Cabir became the first mobile-based worm, infecting Symbian-based devices including old Samsung and Nokia models. Although it was developed as a proof-of-concept, within a year Cabir helped spawn mobile malware including the first mobile Trojan (Qdial) and mobile application hack (Skulls). Today, explosion of smartphones and tablets has spawned an entirely new hacking industry – one that has the potential to bypass your current cybersecurity strategies if you have not included mobile protection.
premium
josh.davis@dlt.com'
January 17, 2013
Commercial & Public Sector Face Same Cybersecurity, Cloud, and Mobile Concerns premium
SailPoint recently released their annual Market Pulse Survey which focuses on professional concerns in IT mobility and cloud computing. Their commercial findings are very similar to the pains currently found in the public sector. This makes sense as we continue using commercial sector IT solutions to solve our own IT problems.
premium
blogs123@dlt.com'