Leaked documents show that Google is steadily tightening the requirements for its partners--such as device maker Samsung--to build Android smartphones.
Google has finally added support for mirroring of an Android smartphone or tablet to Chromecast.
Parallels earlier this week took the wraps off Parallels Access 2.0, a major upgrade of its remote access tool.
HTC produces the three most popular Android smartphones vulnerable to the Heartbleed bug--the HTC Evo, One S and One X--according to data compiled by security firm Lookout from 100,000 Heartbleed Detector users.
While Intel, Marvell, MediaTek, Qualcomm and Nvidia announced their first 64-bit mobile processors at the 2014 Mobile World Congress, Android smartphones running 64-bit chips are unlikely to hit the market before the second half of the year, judges ABI Research.
Check out the hottest mobile IT news for Jan. 30, including the way Sam Adams plans to utilize mobile devices in its latest ad campaign, the forked path Android devices are taking, the best ways to integrate BYOD policies at your business, Dell's latest cloud offering and how tablets and e-readers are affecting readership numbers.
Quick takes on mobile IT news for Thurs, 12/19 including: a seven point checklist for things a product needs to be considered "enterprise-grade," Moovit (a crowdsourced transit apps) new multi-million dollar acquisition, CTO Udi Nir of ModCloth offers advice on what it means to be a 'mobile-first' business, the ins and outs of creating an enterprise mobile app according to Wired and a U.K-based company's example of an Android smartphone BYOD policy.
If a user falls to the ground, the smartphone can collect surrounding data from photos to sounds and other information to determine whether emergency services, be that an ambulance or the police, should be summoned--the same way that cars can summon help automatically when there is a car crash.
Mobile news roundup for Tuesday 10/8.
WASHINGTON, D.C.--Smartphone apps embed third-party user interfaces, such as advertisements, which can introduce security risks, warned University of Washington researchers in a paper presented at the USENIX Security 2013 conference.