ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Computing Research

  • Best practices to make BYOD simple and secure

    Sponsored by: Citrix

    Gain best practices and key considerations to keep in mind when implementing a Bring Your Own Device (BYOD) program. Find out how you can simplify management and reduce costs while keeping data secure and compliant in this resource.

  • Mobile Device Security Overview

    Sponsored by: SearchSecurity.com

    This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.

  • Top 8 Considerations to Enable - and Simplify - Mobility

    Sponsored by: SearchSecurity.com

    Embracing mobility doesn't need to be complicated or costly. Gain expert advice on the top 8 considerations for simply, but effectively enabling mobility in both the enterprise and the IT department.

  • Introducing BlackBerry Balance™ Technology

    Sponsored by: BlackBerry

    Learn more about how BlackBerry® Enterprise Server or BlackBerry® Enterprise Server Express, along with specific IT policies and features built into the device software, help keep personal information separate and business information highly secure.

  • IBM: When IBM and RIM Team Up both Employees and Customers can Benefit

    Sponsored by: BlackBerry

    Access this case study to see how IBM enhanced its collaborative, innovative culture with a wireless solution in partnership with RIM to benefit their mutual customers. Learn how the BlackBerry® Enterprise Solution was used to connect mobile employees using the Lotus suite of products and other applications.

  • The Mobile App Top 10 Risks

    Sponsored by: Veracode, Inc.

    This expert webcast reveals the top 10 mobile application risks facing organizations today.

  • Best Practices for Effective Wireless Transformation Series - Episode 1

    Sponsored by: Alcatel-Lucent

    In this podcast episode, Jean discusses changes in the wireless marketplace, how new devices are creating a need for greater intelligence in the network, and the key factors service providers should consider when planning a migration to address mobile data traffic demands.

  • UT Dallas: University turns to smartphones for multi-year research project

    Sponsored by: BlackBerry

    UT Dallas’ Center for Children and Families has been conducting a study on adolescents’ social networks and their impact on development. To assist in data collection, the team chose BlackBerry® hosted solution from Ceryx based on its ability to provide a controlled environment for their research.

  • Application Control at the Wireless Edge

    Sponsored by: Xirrus

    With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.

  • Building Mobility into Your Network

    Sponsored by: NETGEAR Inc.

    Business environments have become increasingly dynamic and have created the demand for unprecedented levels of workforce mobility. These demands for business mobility require networks and data to be securely accessible anytime and anywhere − throughout the office, as well as from remote locations. Read this white paper to find out more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.