mobility

How To Save Money Buying Mobile Devices

While prices continue to drop thanks to Moore’s Law, investing in mobile devices — whether that’s for laptop PCs, tablets or phones — still represents a major capital outlay. Follow these guidelines to cut down on needless expenses.


Get Lifehacker's 'Making Mobility Real' Ebook For Free

How can you take advantage of the benefits mobile technology offers while minimising the security risks? Our new free ebook Making Mobility Real has the answers.


Why Data Matters More Than Devices

Because individual mobile devices are often expensive, the focus for individuals is frequently on physical security. While this is understandable, it’s utterly meaningless from a business perspective.


The Top 5 Rules For Mobile Security

Mobile security ultimately relies on a mixture of smart technology choices and well-communicated policies. These are the key rules you need to remember.


Should You Let Staff Choose Their Own Devices?

One of the most fundamental questions facing any business looking to update its mobile strategy is this: should you let your staff choose whatever technology they like and offer to support it, or instead force them to pick from a more restricted list? Let’s weigh up the pros and cons of each approach.


Building An App Is Not Always The Answer

During the time when I worked in IT, one of my least favourite situations was when the business showed up with a answer before they’d really understood their questions. Forrester vice president Josh Bernoff dives head-long into that territory, with a focus on mobile development in a recent blog post.


How We're All Coping In The Mobile Cloud

According to Lillian Tay, a principal research analyst with Gartner, smartphones are becoming the hub of cloud services and tablets have created a new paradigm for computer usage that has never been seen or thought before by consumers.


Use The Pareto Principle To Manage Mobile Security More Effectively

The Pareto principle argues (in simplistic terms) that 80 per cent of effects derive from just 20 per cent of causes. The 80:20 rule can be a useful approach to adopt when you’re trying to devise mobile security strategies, especially as bring-your-own-device (BYOD) creates an ever-diversifying stream of devices that need to be controlled.


Even Government Agencies Have BYOD Policies These Days

Government IT is often portrayed as slower to deploy and less flexible than other sectors. Yet as this infographic from BlinkMobile suggests, even in government circles, almost two-thirds of agencies have BYOD policies for mobile phones.


What's The Most Inappropriate Gadget You Use While Walking?

The indomitable rise of portable computing has led to a uniquely 21st century phenomena: people blithely walking into potential mayhem while ogling their gadgets. Most of us are guilty of doing this — especially on smartphones — but on which gadget do you personally draw the line?