Business of Information Technology  >   Business Processes  >   eCommerce  >  

Mobile Commerce

RSS Feed    Add to Google    Add to My Yahoo!
Mobile CommerceReports
 
Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Create a strong, dynamic customer experience
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, learn how retail businesses should leverage technology to gather more customer info, implement the appropriate changes to their services, and create a more enjoyable shopping experience. Click now to see how to manage and maximize opportunity from omni-channel services.
Posted: 20 Jan 2014 | Published: 30 Nov 2012

Hewlett-Packard Company

Personalizing Your Workplace Experience
sponsored by CSC
WHITE PAPER: This exclusive white paper details key factors of mobility and how device integration and security are key to getting the most out of mobility. Read on to learn more.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

CSC

IDC: Device Proliferation and the Important Role of Thin Clients
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility and how it's used in organizations to drive the best benefits possible. Read on to learn more.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

Citrix

CIO Spotlight: Controlling Data Risk In the BYOD Onslaught
sponsored by CommVault
WHITE PAPER: This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM
WHITE PAPER: Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as an in-depth look at one solution that was able to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

IBM

Mobility Experts Weigh In: What You Need to Know About Mobile Workspaces
sponsored by Citrix
WEBCAST: This exclusive webcast offers an in-depth look at mobile workspaces with 3 expert speakers.  Sign up now.
Posted: 21 Nov 2014 | Premiered: Nov 17, 2014

Citrix

The 2014 Wi-Fi Challenge: Understanding and Managing Wi-Fi in Today's Mobile World
sponsored by Extreme Networks
WHITE PAPER: This exclusive paper contains key issues to consider when trying to conquer the mobile revolution, lead by Robin Layland, principal analyst of Layland Consulting. Read on to learn more.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Extreme Networks

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

Balancing wireless LAN troubleshooting strategies for BYOD
sponsored by Extreme Networks
EGUIDE: This expert E-Guide highlights the variety of tools available for proactive and responsive BYOD troubleshooting.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Extreme Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement