Apple seizes power

Email not displaying correctly? View it in your browser.

Computerworld Mobile/Wireless Computing

Oct 11, 2018
Featured Image

Google's most exciting new gadget is neither phone nor tablet

The most interesting, inventive, and impactful launch of the week isn't what you'd expect. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Apple seizes power
Razer Phone 2 hands-on
With the Pixel 3, Google is playing its own game
Top Google Pixel 3 camera features
Prepping your UEM strategy? Tips for a successful deployment

eBook: Lookout

eBook: How to Buy an Enterprise Mobile Security Solution

Get the eBook "How to Buy an Enterprise Mobile Security Solution" to assist you throughout the process of managing a mobile security initiative, including guidance for every phase of a mobile security project from evaluating solutions to deployment. Read More

Thumbnail Image

Apple seizes power

Apple’s deal with Dialog Semi gives Apple access to cutting-edge wireless power technologies. Read More

Thumbnail Image
Video

Razer Phone 2 hands-on

The Razer Phone 2 might look the same at first glance, but it's been redesigned from the inside out. Watch Now

Thumbnail Image

With the Pixel 3, Google is playing its own game

This week's Pixel 3 launch makes one thing clear: Google's strategy for competing with other smartphone manufacturers is to play a completely different game. Read More

Thumbnail Image
Video

Top Google Pixel 3 camera features

Mike Simon shows us his picks for the best camera features on the Google Pixel 3, including Night Sight, Top Shot, and more. Watch Now

Thumbnail Image
INSIDER

Prepping your UEM strategy? Tips for a successful deployment

Unifying all your corporate devices under a single management console can increase efficiency and cut costs. But a successful rollout will take time and is likely to be hampered by a transition away from legacy apps, retraining for IT staff – and likely pushback from users. Read More

Research/Infographic: Lookout

Get the Mobile Risk Matrix

Your organization's sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a look at the Mobile Risk Matrix in this infographic now. Read More

Subscribe to Computerworld First Look

Sign up for our popular daily newsletter. You'll get Computerworld's top stories, first thing in the morning. We deliver breaking news and in-depth features on topics like Windows 10 and enterprise mobility, as well as authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — in-depth articles available only to Insider members. You get access not only to Computerworld's Insider content but to selected Insider content from InfoWorld, CIO.com, Network World, CSO, and other IDG publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Mobile/Wireless Computing as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to [email protected].