ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile ComputingResearch

  • McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution

    Sponsored by: McAfee, Inc.

    This paper offers an overview of the serious risks associated with the use of mobile devices. View now to explore best practices for mitigating mobile security risks, key requirements for an enterprise mobility management (EMM) solution, how to leverage the benefits of mobile devices while reducing risks and costs with McAfee, and more.

  • School Bus Tracking Market Brief

    Sponsored by: AT&T Corp

    This paper discusses how mobile resource management (MRM) solutions can give administrators greater visibility into the location of assets and help organizations create a safer, more cost-effective transportation system.

  • Mobile Optimization – It’s Now or Never

    Sponsored by: AT&T Corp

    Read this article to discover best practices for creating a a consumer-friendly, mobile shopping experience.

  • Mobile Integration, Simplified: Part 4 - Building Industrial-Strength Mobile Apps

    Sponsored by: Teamstudio, Inc.

    User demand has forced IT to re-evaluate company policies and embrace mobile computing. Access this exclusive resource to explore how companies are now taking mobile computing to the next level with customized mobile applications designed to enhance productivity in the workplace.

  • BlackBerry Enterprise Server Express

    Sponsored by: BlackBerry

    By mobilizing email, calendar, personal information management, and your business applications, your company can boost business performance, increase productivity and enable workers to make timely decisions based on the most accurate information available.

  • Protect Sensitive Data on Laptops - Even for Disconnected Users

    Sponsored by: Citrix Systems, Inc.

    Securing corporate data is a top IT imperative and with more employees working from alternative locations, the mobile security challenge has become a critical focus for IT.  Read this white paper to understand how local virtual desktops based on Citrix XenClient should be a part of your security strategy.

  • Tablets Reshape Retail: Why tablets are the ideal tool for customer engagement

    Sponsored by: AT&T Corp

    Access this white paper to discover answers to all of your tablet-related questions, in specific relation to tablet usage in the retail arena.

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: BlackBerry

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • IBM: When IBM and RIM Team Up both Employees and Customers can Benefit

    Sponsored by: BlackBerry

    Access this case study to see how IBM enhanced its collaborative, innovative culture with a wireless solution in partnership with RIM to benefit their mutual customers. Learn how the BlackBerry® Enterprise Solution was used to connect mobile employees using the Lotus suite of products and other applications.

  • Best Practices for Effective Wireless Transformation Series - Episode 1

    Sponsored by: Alcatel-Lucent

    In this podcast episode, Jean discusses changes in the wireless marketplace, how new devices are creating a need for greater intelligence in the network, and the key factors service providers should consider when planning a migration to address mobile data traffic demands.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.