IT Services  >   Telecommunications Services  >   Wireless Services  >  

Mobile Location Services

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Location Services White Papers (View All Report Types)
 
Location-Based Services: Enhance the Customer Experience
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at location-based services (LBS) that promise a budding customer-centric mobility solution in early adopters. Read on to learn more.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

Cisco Systems, Inc.

Magic Quadrant for Web Content Management
sponsored by SDL Web Content Management Solutions Division
WHITE PAPER: This Magic Quadrant will help CIOs and business and IT leaders that are analyzing their Web strategies to assess whether they have the right Web Content Management offering to support them. Use this Magic Quadrant to understand the fresh vitality in the WCM market and how Gartner rates the leading vendors and their packaged products.
Posted: 08 Sep 2010 | Published: 07 Sep 2010

SDL Web Content Management Solutions Division

Scalability in Log Management
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper will take you through the process of selecting a log management solution for your organization. It will provide you with information about log management, as well as the requirements you should be looking for in a log management solution.
Posted: 17 May 2011 | Published: 17 May 2011

ArcSight, an HP Company

Business-strength Geocoding: Ten requirements for more cost-efficient and effective business decisions
sponsored by Pitney Bowes Business Insight
WHITE PAPER: Geocoding determines location by linking longitude and latitude coordinates with street address data. By identifying your best customers’ location and defining how to reach them most effectively you possess the ultimate decision making tool. Utilize the power of location intelligence to know the location of your customers, partners and competitors.
Posted: 22 Sep 2010 | Published: 22 Sep 2010

Pitney Bowes Business Insight

E911 VoIP Essentials for Enterprise Deployments
sponsored by XO Communications
WHITE PAPER: Deploying VoIP across multiple business locations is a great way to simplify and streamline your distributed network and reduce costs, but how does a business provide E911 effectively across the enterprise and what are the legal requirements?
Posted: 02 Dec 2010 | Published: 02 Dec 2010

XO Communications

Implement a More Secure Network to Keep Up with Shadow IT
sponsored by Verizon
WHITE PAPER: This white paper examines the ramifications of the growth of shadow IT and examines how you can protect against potential issues. Read on to learn how you can implement a more secure network to keep up with evolving IT demands.
Posted: 12 Nov 2014 | Published: 31 Dec 2013

Verizon

How Telcos Can Outpace Commoditization in the Application Economy
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how telecommunications service providers are uniquely positioned to leverage their infrastructure, expertise, and insights to provide identity management services for the application economy.
Posted: 13 Nov 2014 | Published: 29 Aug 2014

CA Technologies.

Extracting the Full Business Value from Cloud Services
sponsored by NaviSite
WHITE PAPER: This white paper proposes that the key to achieving the most value from cloud investments includes considering the impact that they will have throughout an entire organization, and explores real-world customer experiences that examine the true business impact of the cloud.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

NaviSite

Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Experience
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper details six ways to introduce mobility into IT service management.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

CA Technologies.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement