IT Agents  >   IT Workforce  >   Work Environment  >  

Workforce Mobility

RSS Feed    Add to Google    Add to My Yahoo!
Workforce MobilityMultimedia (View All Report Types)
 
NASCAR Team Uses Rugged Notebook to Speed Past the Competition
sponsored by Dell, Inc.
WEBCAST: This exclusive webcast examines how a NASCAR team utilized a rugged notebook solution built to endure even the roughest of field conditions.
Posted: 13 Jun 2014 | Premiered: Nov 30, 0002

Dell, Inc.

Give Your Users What They Want with Cloud and Mobile
sponsored by IBM
WEBCAST: This informative webcast discusses how moving to the cloud can accelerate mobile adoption, as well as how to combine the power of cloud with the freedom and functionality of mobile.
Posted: 07 Oct 2014 | Premiered: Oct 7, 2014

IBM

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Secure Remote Access to VPN with Mobile and Tokenless Authentication
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Adopt Social Cloud Capabilities to Drive Rapid Innovation and Accelerate Time-to-Value for Your Business
sponsored by IBM
WEBCAST: Mobile and social technologies have led us to change the way we work not only by ourselves, but with others.  Adopting a social cloud early can provide rapid innovation for your business.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

IBM

Enterprise Mobility Management: IT Solutions
sponsored by MobileIron
WEBCAST: Employees are rapidly adopting mobile technology, and managing all of it is no simple task.  Having experienced higher job satisfaction and productivity, mobile users continue to work with hightened expectations of a network connection as strong and secure as being in the office.
Posted: 19 Aug 2014 | Premiered: Aug 19, 2014

MobileIron

The Challenge: Enabling A Mobile Workforce
sponsored by Raytheon Trusted Computer Solutions
WEBCAST: This exclusive webcast examines a mobile content enablement solution that provides your mobile workforce with secure access to critical information and data, allowing them to do their jobs efficiently and effectively.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Raytheon Trusted Computer Solutions

Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013

SearchSecurity.com

Mobile Device Management Live Chat
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
Posted: 14 Jun 2013 | Premiered: 14 Jun 2013

SearchSecurity.com

Mobile Analytics for On-the-Go Decisions
sponsored by SAP America, Inc.
VIDEO: In this brief video, explore how you can make intelligent decisions on the go with mobile applications and devices. Learn from a variety of use cases how you implement mobile applications in your enterprise.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

SAP America, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement