ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Device Management Research

  • Mobile at Work: What You Don’t Know Can Hurt You

    Sponsored by: Bluebox

    With the average employee using 21 apps in the workplace, how can IT maintain a secure environment for sensitive company information? View this infographic to see essential facts about how smartphones and tablets are being used in the workplace, and how this effects data security.

  • Computer Weekly: The Rise of Home Automation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in smart home technology and the opportunities it presents for businesses. Our new buyer's guide examines the options for setting up an enterprise app store. And we find out how in-store tracking technology could improve the retail experience for shoppers. Read the issue now.

  • Designing and Stocking an Enterprise App Store

    Sponsored by: TechTarget Mobile Computing

    An enterprise app store should look simple to users, but IT must consider factors such as licensing, ties to public app stores and private clouds, and custom app development.

  • Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.

  • Minimise the Security Risks of Mobile Email Access

    Sponsored by: Hewlett-Packard Enterprise

    This expert e-guide will teach you how to put airtight security measures on remote e-mail access.

  • Computer Weekly: Going mobile in financial services

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.

  • Computer Weekly – 22 July 2014: Time to get serious about endpoint security

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer's guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now.

  • Maintaining Control Over Mobility and the Cloud

    Sponsored by: TechTarget Mobile Computing

    Access this expert guide to learn about the basics of how mobile devices will impact your enterprise data, and what you have to do to stay ahead of dangerous mishaps.

  • Computer Weekly – 15 July 2014: Time for an upgrade? Why you should buy IT now

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as competitive pressures and new technologies drive down IT prices, we find out why now is a great time to buy IT. We examine why going digital means a different approach to IT management. And we hear the latest best practices for improving your customer engagement with IT. Read the issue now.

  • Bring Your Own Cloud: Cloud Services Get Personal in the Workplace

    Sponsored by: TechTarget Cloud Computing

    In this guide, consultant Tom Nolle and journalist George Lawton discuss the "bring your own cloud" trend, offering sound advice for organizations looking to keep ahead of the cloud curve.

  • State of the Art on Managing Endpoints

    Sponsored by: Dell and VMware

    This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.

  • The Next Mobility Model: COPE Challenges BYOD

    Sponsored by: TechTarget Mobile Computing

    Now that the dust has settled around bring your own device, some IT shops have turned to the COPE, or corporate-owned, personally enabled, approach to mobile device management.

  • Computer Weekly – 8 July 2014: The most influential women in UK IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal our annual list of the 25 most influential women in UK IT – female IT leaders making a difference to the digital economy. We look at how to integrate iPads into the corporate IT infrastructure. And we profile enterprise software upstart Workday as it challenges Oracle and SAP. Read the issue now.

  • IBM SmartCloud Desktop Infrastructure

    Sponsored by: IBM and Intel.

    This informative whitepaper highlights the benefits of desktop virtualization, ways to make the transition, and robust tools that enable management across the widest range of devices and systems. Find out why more and more organizations are considering this strategy today.

  • IBM SmartCloud Desktop Infrastructure Reference Architecture: Citrix VDI-in-a-Box powered by IBM System x

    Sponsored by: IBM and Intel.

    This brief whitepaper looks at powerful and effective features of a combined hardware and software desktop virtualization platform that provides organizations with an all-in-one VDI strategy for simplified, efficient deployment.

  • Are You Asking the Right Questions?

    Sponsored by: Hewlett Packard Enterprise

    Make sure you're asking your IT staff the right questions about the latest data management, analytics, big data and cloud technologies.

  • BPS Edge: CEM The New Style of Customer Engagement Management

    Sponsored by: Hewlett Packard Enterprise

    Find out about the most recent customer engagement management innovations.

  • BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure

    Sponsored by: Sophos

    This informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the brand while ensuring that your sensitive data is protected.

  • Mobile Device Management Buyers Guide

    Sponsored by: Sophos

    This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.

  • Mobility and Cloud Keys to Fulfilling Promise of Electronic Medical Records

    Sponsored by: Citrix/IBM/Atlantis Computing

    This exclusive resource discusses the key role that mobility and cloud computing play in addressing the challenges healthcare organizations face today, providing helpful tips for which solutions are best for virtualizing EMR systems across a wide variety of desktops and mobile devices.

  • Emerging Trends Radar Screen

    Sponsored by: Gartner

    Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.

  • Microsoft and SAP Announce New Cloud, Data and Mobile Experiences

    Sponsored by: SAP America, Inc.

    SAP and Microsoft have maintained a long-term global partnership, but with new cloud, data, and mobile offerings, this partnership is taking things to the next level. In this press release, discover the exciting new projects that stem from the Microsoft-SAP collaboration and learn how they can benefit your business.

  • A New Style of IT: The Dawn of a New Normal

    Sponsored by: Hewlett Packard Enterprise

    Uncover the key findings from research conducted by Gartner to expose what digital business means for companies, and how to enhance the customer experience to thrive in the digital era.

  • Data Security for Mobile Users: One Size Does Not Fit All

    Sponsored by: Accellion, Inc.

    Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.

  • Computer Weekly – 1 July 2014: Supporting Apple in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide takes an in-depth look at how to support Apple products in an enterprise IT infrastructure. We find out how eBay built its own Openstack private cloud. And the chief of the government's G-Cloud programme talks about changing public sector IT procurement. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.