IT Management  >   Systems Operations  >   Networking  >  

Mobile Computing

RSS Feed    Add to Google    Add to My Yahoo!
Mobile ComputingReports
 
Expert Tips on Getting Mobile Securely with Virtual Desktops
sponsored by SearchSecurity.com
EGUIDE: In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices.
Posted: 30 Sep 2011 | Published: 30 Sep 2011

SearchSecurity.com

UK IT priorities 2012
sponsored by ComputerWeekly.com
IT BRIEFING: This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

ComputerWeekly.com

E-Zine: Software Testing Vol.3: This Issue of Software Testing Delves Into Mobile Application and Regression Testing
sponsored by IBM
EZINE: This e-zine covers the topic of testing and retesting defects and cites the Blackberry blackouts of 2007 and 2008 as examples of issues that could have been detected by regressing testing.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

IBM

School Bus Tracking Case Study
sponsored by AT&T Corp
CASE STUDY: This case study examines how one organization used GPS asset tracking technology to provide safety, security and reduced operational costs.
Posted: 13 Oct 2011 | Published: 13 Oct 2011

AT&T Corp

AT&T Mobile Remote Access Services
sponsored by AT&T Corp
PRODUCT OVERVIEW: AT&T's Mobile Remote Access Services provides flexible, highly secure access to corporate assets for all users.
Posted: 21 Oct 2011 | Published: 21 Oct 2011

AT&T Corp

Wireless Resource Management For Maximum Reliability and Scalability
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explores a scalable, high performance, easily managed WLAN solution that intelligently and effectively manages all network resources to deliver optimized performance and scalability.
Posted: 18 Jan 2012 | Published: 18 Jan 2012

Juniper Networks, Inc.

Small Cells and U!
sponsored by Ruckus Wireless
PRESENTATION TRANSCRIPT: This presentation transcript explores the possibility of making the process of connecting to Wi-Fi services as easy, seamless and secure as today's 3G cellular networks
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Ruckus Wireless

End User Experience Unplugged
sponsored by Aternity
VIDEO: Discover how a breakthrough end user experience (EUE) management tool can help you unlock performance management for all platforms and application types to ensure the optimal user experience regardless of device or location.
Posted: 23 May 2012 | Premiered: 02 Apr 2012

Aternity

The CIO's Guide to Wireless in the Enterprise
sponsored by BlackBerry
WHITE PAPER: Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with business mobility and where to find additional resources for consideration.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

BlackBerry

IBM: When IBM and RIM Team Up both Employees and Customers can Benefit
sponsored by BlackBerry
CASE STUDY: Access this case study to see how IBM enhanced its collaborative, innovative culture with a wireless solution in partnership with RIM to benefit their mutual customers. Learn how the BlackBerry® Enterprise Solution was used to connect mobile employees using the Lotus suite of products and other applications.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement