Smart Handheld Devices Reports

Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018

TechTarget ComputerWeekly.com

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

How a unified workspace solution is built for hybrid environments
sponsored by NComputing
VIDEO: Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.
Posted: 06 Oct 2014 | Premiered: 01 Oct 2014

NComputing

Mobility and the Channel
sponsored by TechTarget IT Channel
EBOOK: This Handbook explores opportunities for IT solution providers in the mobile market, delving into detail on those with the greatest potential return for value-added resellers (VARs), systems integrators and IT consultants.
Posted: 06 Mar 2014 | Published: 07 Mar 2014

TechTarget IT Channel

Enable "Have it Your Way" Enterprise Mobility
sponsored by Hewlett-Packard Enterprise
EBOOK: In this SearchCIO handbook, expert contributor Harvey Koeppel explains that workforce mobility has existed since the word "peddler" was coined, but CIOs must embrace new strategies in order to aim these devices at business needs.
Posted: 07 Mar 2014 | Published: 12 Mar 2014

Hewlett-Packard Enterprise

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

True Stories of the Connected: Same Day Delivery
sponsored by Cisco Systems, Inc.
CASE STUDY: This brief but informative webcast examines how bike messengers on the streets of San Francisco are benefiting from the increased connectivity that mobile technology provides.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Cisco Systems, Inc.

Top Considerations for Collaboration in the IoT and Mobile Era
sponsored by Citrix
EGUIDE: Explore what key considerations to keep in mind when selecting the collaboration tools for your organization. Factoring in trends like increased cloud, mobile, and especially IoT adoption, find out how to evaluate collaboration tools for integration with third party apps, enterprise content search, AI, automation, and more.
Posted: 24 Oct 2017 | Published: 19 Oct 2017

Citrix

Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now.
Posted: 31 Mar 2014 | Published: 01 Apr 2014

TechTarget ComputerWeekly.com

Laptop security challenges: Will smartphones be their replacement?
sponsored by Dell and Microsoft
EGUIDE: Laptops face a number of security challenges, from no log-on requirements to blank and weak passwords. Download this e-guide to learn about laptop security issues that you may not have considered or that you might be looking at from the wrong perspective.
Posted: 18 May 2018 | Published: 17 May 2018

Dell and Microsoft