IT Management  >   Systems Operations  >   Networking  >  

Mobile Computing

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Computing White Papers (View All Report Types)
 
Building Mobility into Your Network
sponsored by NETGEAR Inc.
WHITE PAPER: Business environments have become increasingly dynamic and have created the demand for unprecedented levels of workforce mobility. These demands for business mobility require networks and data to be securely accessible anytime and anywhere − throughout the office, as well as from remote locations. Read this white paper to find out more.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

NETGEAR Inc.

Managing the Mobile Enterprise: A Guide for Creative Effective Enterprise Wireless Strategies
sponsored by Palm, Inc.
WHITE PAPER: In this white paper, learn the five key requirements for choosing the right mobile solution provider, including delivering tangible ROI, flexible service and support and enterprise-class security.
Posted: 20 Apr 2007 | Published: 01 Apr 2007

Palm, Inc.

Managing the Mobile Enterprise: A Guide for Creating Effective Enterprise Wireless Strategies
sponsored by Good Technology
WHITE PAPER: While planning for wireless access to enterprise information, IT managers must consider five key necessities. Read this white paper to find out the five key considerations.
Posted: 22 Feb 2008 | Published: 22 Feb 2008

Good Technology

Simplify Network Management with New Secure and Scable Wireless Solutions
sponsored by Dell, Inc.
WHITE PAPER: Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.
Posted: 05 Aug 2013 | Published: 31 Jul 2013

Dell, Inc.

The Quest for Competitiveness: Business Mobility and the Agile Organization
sponsored by Nokia
WHITE PAPER: Business mobility is at the heart of a nimble organization. It draws together people, processes, and technology to push better decision making. Download this Economist Intelligence Unit report to find out how organizations are using business mo...
Posted: 15 Oct 2007 | Published: 01 Oct 2007

Nokia

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
sponsored by Motorola, Inc.
WHITE PAPER: This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
Posted: 19 Aug 2009 | Published: 01 May 2007

Motorola, Inc.

Successful Mobile Deployments Require Robust Security
sponsored by BlackBerry
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 15 Oct 2010 | Published: 20 May 2009

BlackBerry

Enterprise Wireless LAN Security
sponsored by Motorola, Inc.
WHITE PAPER: This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.
Posted: 29 May 2008 | Published: 01 May 2008

Motorola, Inc.

Managing and Monitoring a Primary Wireless Network
sponsored by Intel Corporation
WHITE PAPER: Intel IT designed a highly automated approach to managing an enterprise primary wireless LAN, with a focus on service level management and monitoring. This white paper has the details.
Posted: 12 Aug 2008 | Published: 01 Feb 2007

Intel Corporation

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement