ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Computing Research

  • Managing mobile UC in a BYOD environment

    Sponsored by: SearchSecurity.com

    This e-guide reviews key tips and considerations to keep in mind when designing mobile UC and Bring Your Own Device (BYOD) policies to keep sensitive information secure while enabling increased flexibility and mobility.

  • Introducing BlackBerry Balance™ Technology

    Sponsored by: BlackBerry

    Learn more about how BlackBerry® Enterprise Server or BlackBerry® Enterprise Server Express, along with specific IT policies and features built into the device software, help keep personal information separate and business information highly secure.

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: BlackBerry

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • School Bus Tracking Market Brief

    Sponsored by: AT&T Corp

    This paper discusses how mobile resource management (MRM) solutions can give administrators greater visibility into the location of assets and help organizations create a safer, more cost-effective transportation system.

  • Application Control at the Wireless Edge

    Sponsored by: Xirrus

    With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.

  • Protect Sensitive Data on Laptops - Even for Disconnected Users

    Sponsored by: Citrix Systems, Inc.

    Securing corporate data is a top IT imperative and with more employees working from alternative locations, the mobile security challenge has become a critical focus for IT.  Read this white paper to understand how local virtual desktops based on Citrix XenClient should be a part of your security strategy.

  • YellowPages.ca Goes Mobile While Sales Force Gets a Boost with BlackBerry Smartphones

    Sponsored by: BlackBerry

    Access this case study to learn how YPG created a consumer mobile version of YellowPages.ca™ and sales applications for BlackBerry® smartphones to expand the reach of its local search database.

  • Yes You Can Connect Employees' Personal Smartphones

    Sponsored by: BlackBerry

    Employees are flooding IT departments with requests to connect their personal smartphones to the company IT infrastructure. Disregarding the real productivity benefits from connected employees, until now many IT departments have been too concerned with security and control risks.

  • Maintaining Wireless Network Availability in Hospitals

    Sponsored by: HP & Intel®

    This e-book from SearchHealthIT.com takes an in-depth look at the primary concerns and drivers behind wireless network connectivity in health care. Inside, uncover an overview of 3 primary wireless technologies to gain a better understanding of how to provide wireless access to hospital staff.

  • Your Guide to Mobile Bill Management Success

    Sponsored by: Xigo

    This expert E-Book highlights best practices for improved mobile bill management and mobile bill consolidation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.