Business of Information Technology  >   Business Processes  >   eCommerce  >  

Mobile Commerce

RSS Feed    Add to Google    Add to My Yahoo!
Mobile CommerceReports
 
Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

10 Steps to Mobile Recovery and Continuity
sponsored by IBM
WHITE PAPER: This crucial paper examines what your organization can do to ensure that your mobile environment is ready in the event your mobile vendor becomes unreliable, providing ten important steps to mobile recovery and continuity.
Posted: 13 May 2014 | Published: 13 May 2014

IBM

Mobile IAM™: The “BYOD Done Right™” Solution
sponsored by Extreme Networks
WHITE PAPER: This exclusive resource examines a comprehensive BYOD solution that provides security, full IT control, and reliable network experience for all users.
Posted: 22 May 2014 | Published: 22 May 2014

Extreme Networks

Thin Clients, Zero Clients, Tablets, Ultra-thin Laptops and Healthcare BYOD
sponsored by Dell, Inc.
WHITE PAPER: This exclusive white paper examines how healthcare organizations can fit mobile devices into their environment effectively so that they can reap the benefits of BYOD without compromising any IT requirements.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Dell, Inc.

A Rugged Competitive Comparison Chart
sponsored by Dell, Inc.
WHITE PAPER: This exclusive paper examines a rugged notebook solution that is built to endure the tough conditions workers will face in the field, comparing it to similar solutions on the market and demonstrating the technical advantage that it provides.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Dell, Inc.

How to Handle the Mobile Revolution
sponsored by bigtincan information
WHITE PAPER: This exclusive paper discusses a mobile tool that allows you to distribute secure, relevant content, documents and information to a vast number of users on smart mobile devices, HTML5 capable web browsers, and traditional desktop or laptop computers.
Posted: 02 May 2014 | Published: 02 May 2014

bigtincan information

Leveraging Privileged Identity Governance to Improve Security Posture
sponsored by CA Technologies.
WHITE PAPER: This exclusive resource takes an in-depth look at insider attacks, and discusses how privileged identity governance can help you identify and deal with potential threats from within your own environment.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

CA Technologies.

2014 Trends to Watch: Ovum Enterprise Mobility
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper takes a look at the state of enterprise mobility today and examines what to look out for as businesses adapt to increasing consumerization and extend the range of tools and applications available to employees on all devices.
Posted: 28 May 2014 | Published: 28 May 2014

CA Technologies.

Defend Your Mobile Applications with Citrix NetScaler
sponsored by Citrix
RESOURCE: This exclusive resource examines a mobile workspace enablement solution that can help your business securely deliver applications, desktops, data, and other services to any device on any network or cloud.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement