ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Computing Research

  • The CIO's Guide to Fixed Mobile Convergence

    Sponsored by: BlackBerry

    Organizations seeking solutions that provide high-performance access while addressing security needs can leverage fixed mobile convergence (FMC) systems to enhance communication. This document explores why your organization should implement an FMC solution, the benefits of FMC and considerations for methods of implementation.

  • Implementing a Secure Wireless Network in an Educational Setting

    Sponsored by: NETGEAR Inc.

    Wireless connectivity has become a necessity in educational institutions of all levels. Students require Internet connectivity to conduct research, download assignments and communicate with their instructors. Likewise, educators utilize web portals to post assignments, and update class materials. Read this white paper to learn more. 

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: BlackBerry

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • E-Guide: Best Practices for the wireless branch office network

    Sponsored by: Aerohive Networks

    Access this expert E-Guide to learn what networking vendors are doing to address the challenges of adding Wi-Fi in branch office networks, as well as what you should look for in wireless branch office networks to ensure success.

  • KPMG Netherlands Counts on Aruba for Network Rightsizing

    Sponsored by: Aruba Networks

    KPMG realized that network edge rightsizing could provide them an opportunity to save money and make money. This case study examines why KPMG chose Aruba to meet the needs of their global enterprise, the specific solutions used and the key benefits achieved.

  • Addressing Mobile Threats: Effective Detection and Response

    Sponsored by: ArcSight, an HP Company

    Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more.

  • Business Intelligence Strategies for 4G Operators

    Sponsored by: Sybase, an SAP company

    This paper explores the opportunities and challenges presented by the introduction of services on 4G networks, and examines how a strategic BI implementation can help to transform the services a company provides while managing costs of providing them. It also considers the variety of practical applications of a BI system.

  • UT Dallas: University turns to smartphones for multi-year research project

    Sponsored by: BlackBerry

    UT Dallas’ Center for Children and Families has been conducting a study on adolescents’ social networks and their impact on development. To assist in data collection, the team chose BlackBerry® hosted solution from Ceryx based on its ability to provide a controlled environment for their research.

  • British American Tobacco Builds SAP® Intelligence into Its Executives’ BlackBerry® Smartphones

    Sponsored by: 3i Solutions

    British American Tobacco needed to enable its global executives to manage essential SAP business processes via their BlackBerry anytime, anywhere. By executing business processes while traveling, executives can spend more of their time collaborating with colleagues, making critical business decisions and adding value when they are in the office.

  • E-Zine: Software Testing Vol.3: This Issue of Software Testing Delves Into Mobile Application and Regression Testing

    Sponsored by: IBM

    This e-zine covers the topic of testing and retesting defects and cites the Blackberry blackouts of 2007 and 2008 as examples of issues that could have been detected by regressing testing.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.