ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Device Management Research

  • Current trends in mobile networking

    Sponsored by: TechTarget ComputerWeekly.com

    We take a glimpse into the future of mobile networking. 5G is the word of the hour thanks to its promise of greatly improving browsing speeds and network capacity - but what exactly do we know about it and the impact it will have? We also discuss if 4G is on its last legs and if Brexit will bring back roaming charges for Brits traveling in the EU.

  • CW Europe – March 2018

    Sponsored by: TechTarget ComputerWeekly.com

    Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit.

  • Mobile security moving to a unified approach

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.

  • Computer Weekly – 13 February 2018: On the path to diversity in tech

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now.

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

  • Computer Weekly – 7 November 2017: The ethics of software development

    Sponsored by: TechTarget ComputerWeekly.com

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

  • Computer Weekly – 27 June 2017: Will mobile networks cope with the end of roaming charges?

    Sponsored by: TechTarget ComputerWeekly.com

    Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges.

  • Laptop, desktop PC and mobile device strategy: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, you can find best practice, analysis of the latest trends, and expert advice on formulating enterprise strategy in laptops, desktop PCs and mobile devices.

  • Focus ASEAN: Enterprise Mobility

    Sponsored by: TechTarget ComputerWeekly.com

    With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient.

  • CW Nordics February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this first issue of CW Nordics in 2017, we take a look what CIOs in the region are expecting in the year ahead. We asked a select group of CIOs and analysts in Denmark, Finland, Norway and Sweden what IT projects are at the top their priority lists.

  • Mobile application platforms: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience.

  • Desktop Virtualisation: The Essential Guide

    Sponsored by: TechTarget ComputerWeekly.com

    Desktop virtualisation, or virtual desktop infrastructure, has come of age, partly thanks to shifts in workplace practices. Employees are increasingly working remotely and need full access to corporate systems. It is often inconvenient to use the corporate laptop but the user still needs access to the systems offsite.

  • CW Nordics August 2016

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.

  • Managing Android devices in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • How businesses can win talent war with mobile apps, HR data analytics, and cloud technology

    Sponsored by: TechTarget ComputerWeekly.com

    Becoming more digital has emerged as a ruling concept among forward-looking organisations in recent years. Now, while having multi-channel engagement with customers is a big aspect of digital, so too is attracting and retaining the employees who can make a reality of digital transformation.

  • Future of Work

    Sponsored by: TechTarget ComputerWeekly.com

    In this extract from his book, The Future of Work, Jacob Morgan looks at the five key factors shaping the way we work.

  • Tackling Mobile Security and BYOD Risks

    Sponsored by: TechTarget Security

    This expert guide from SearchSecurity.com examines the top risks of mobile security and what BYOD risks your enterprise could encounter, along with how you can rethink network security and take the steps needed to ensure a successful BYOD experience.

  • Security Checklist

    Sponsored by: Vox Mobile Solutions

    Mobile Thought Leaders (MTL) Research gathers insights from professionals focused onadvancing or supporting mobile and digital transformation initiatives.

  • The changing mobile platform landscape

    Sponsored by: TechTarget ComputerWeekly.com

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

  • Crafting a Secure Endpoint Management Strategy

    Sponsored by: Vox Mobile Solutions

    Download this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.

  • Devices-as-a-Service Potential Set to Expand for Channel Partners and Organizations

    Sponsored by: CompuCom Systems, Inc.

    This expert guide serves as your window into the DaaS market—deconstructing the DaaS growth forecast, how to become a DaaS provider should you choose to do so, and how your company can make the most of mobile services. Read on for the details.

  • The Rise of Unified Digital Workspaces

    Sponsored by: Citrix

    Unified workspaces have many advantages and allow users to work with the devices and resources they prefer, but they also introduce a number of complexities for IT. In this e-guide you'll uncover how to address these complexities and undergo a successful digital workplace transformation.

  • Laptop security challenges: Will smartphones be their replacement?

    Sponsored by: Dell and Microsoft

    Laptops face a number of security challenges, from no log-on requirements to blank and weak passwords. Download this e-guide to learn about laptop security issues that you may not have considered or that you might be looking at from the wrong perspective.

  • Take a Mobile-First Approach to Digital Transformation

    Sponsored by: TechTarget Mobile Computing

    Download this handbook to learn how EMM tools have changed with the market, and use this guide as a way to craft the best mobility strategy for your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.