ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Computing Research

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: Lopez Research

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • Mobile Optimization – It’s Now or Never

    Sponsored by: AT&T Corp

    Read this article to discover best practices for creating a a consumer-friendly, mobile shopping experience.

  • Maximizing Smartphone Value: Standardize and Simplify

    Sponsored by: BlackBerry

    In this white paper, learn how your midsize organization can build a comprehensive mobile strategy and stay head of the competition.

  • IT Briefing: Desktop Virtualization for Mobile Users

    Sponsored by: Citrix

    In this IT Briefing, learn how to extend the benefits of desktop virtualization to mobile users. Discover a tool that enables users to achieve the benefits of virtual desktops through laptops. Learn about the advantages to this approach, including improved security and flexibility.

  • Exchange Insider E-zine - Volume 3: Real-world Exchange 2007 Server Migrations

    Sponsored by: SearchWindowsServer.com

    In this issue of Exchange Insider e-zine, get an in-depth look at some real-world Exchange 2007 migration projects, what can go wrong and how to make the most of Exchange 2007's capabilities. This issue also highlights some must-have tools for securing mobile environments in Exchange as well as tips on keeping your servers running in peak condition

  • A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network

    Sponsored by: Motorola, Inc.

    This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: BlackBerry

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • Application Control at the Wireless Edge

    Sponsored by: Xirrus

    With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.

  • eBook - The Mobile Enterprise: Taking Wireless Networking to the Next Level

    Sponsored by: SearchMobileComputing

    Read this eBook to learn how faster, more robust 802.11n WLANs can help your business offer new mobility services to improve mobility and reduce cost through fixed-mobile convergence. Discover how unified communications applications can exploit wireless mobile connectivity to facilitate workforce collaboration and enhance productivity.

  • Computer Weekly: The Rise of Home Automation

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in smart home technology and the opportunities it presents for businesses. Our new buyer's guide examines the options for setting up an enterprise app store. And we find out how in-store tracking technology could improve the retail experience for shoppers. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.