ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Computing Research

  • Myth vs. Reality: Cloud-Managed Wireless LAN and the Primary Access Network

    Sponsored by: SearchSecurity.com

    This expert E-Guide debunks common misconceptions associated with cloud-managed wireless LAN (WLAN) offerings. Separate fact from fiction and discover the opportunity of next-generation WLAN by reading on now.

  • Managing mobile UC in a BYOD environment

    Sponsored by: SearchSecurity.com

    This e-guide reviews key tips and considerations to keep in mind when designing mobile UC and Bring Your Own Device (BYOD) policies to keep sensitive information secure while enabling increased flexibility and mobility.

  • Software Testing Vol.3: This Issue of Software Testing Delves Into Mobile Application and Regression Testing

    Sponsored by: SearchSoftwareQuality.com

    This ezine covers the topic of testing and retesting defects and cites the Blackberry blackouts of 2007 and 2008 as examples of issues that could have been detected by regressing testing.

  • 5 ways to improve WLAN reliability, performance and capacity

    Sponsored by: Hewlett Packard Enterprise

    Learn best practices for wireless LAN design, deployment and management while discovering solutions to tackling WLAN network challenges.

  • IBM: When IBM and RIM Team Up both Employees and Customers can Benefit

    Sponsored by: BlackBerry

    Access this case study to see how IBM enhanced its collaborative, innovative culture with a wireless solution in partnership with RIM to benefit their mutual customers. Learn how the BlackBerry® Enterprise Solution was used to connect mobile employees using the Lotus suite of products and other applications.

  • Protecting Your Website With Always On SSL

    Sponsored by: Symantec Corporation

    This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.

  • The CIO’s Guide to Mobilizing the Enterprise

    Sponsored by: BlackBerry

    A successful mobility plan should focus on ‘mobilizing’ your critical business processes and include planning phases for discovery, development and deployment. This guide focuses on how to build an effective mobility plan while providing valuable insight into the benefits of mobilizing your business applications.

  • Mobilizing I.T. Support to Achieve Efficiency, Speed, and Effectiveness

    Sponsored by: BMC Software, Inc.

    To survive in today's economy, your IT organization will face increasing pressure to do more with less and work from anywhere at anytime. Imagine how much more productive your service desk personnel could be if they were able to periodically manage and respond to issues from the field, rather than having to check in at their desktops.

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: BlackBerry

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • Computer Weekly: The Rise of Home Automation

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in smart home technology and the opportunities it presents for businesses. Our new buyer's guide examines the options for setting up an enterprise app store. And we find out how in-store tracking technology could improve the retail experience for shoppers. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.