IT Agents  >   IT Workforce  >   Work Environment  >  

Mobile Workers

RSS Feed    Add to Google    Add to My Yahoo!
Mobile WorkersReports
226 - 250 of 956 Matches Previous Page  | Next Page
IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Analyst Report: Addressing the Complexities and Growing Requirements of the Future
sponsored by IBM
ANALYST REPORT: As mobile device adoption gains traction for personal usage, it's also becoming increasingly popular in the workplace. In response, enterprises must develop strategies for managing the inherent complexity of these new devices in order to improve productivity and optimize performance, while also protecting data and maintaining security.
Posted: 15 Jan 2014 | Published: 31 Oct 2012

IBM

Accelerating the deployment of a secure mobile enterprise
sponsored by IBM
WHITE PAPER: In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology.
Posted: 15 Jan 2014 | Published: 31 Oct 2013

IBM

Securing mobile devices in the business environment
sponsored by IBM
WHITE PAPER: As smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value.
Posted: 15 Jan 2014 | Published: 31 Oct 2011

IBM

Enterprise Mobility University: Consumerization and the Cloud
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Converging consumerization trends affect how organizations maintain control while enabling users.
Posted: 10 Jan 2014 | Premiered: 28 Jan 2014


Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

How to Power Workforce Mobility with VDI
sponsored by Citrix
WHITE PAPER: This brief resource reveals how virtualization technology helps meet a wide array of virtualization goals, from enabling BYOD to transforming call centers, and provides a desktop virtualization solution checklist to help you pick your solution.
Posted: 08 Jan 2014 | Published: 08 Jan 2014

Citrix

5 Approaches that will kill your mobility project
sponsored by Citrix
WEBCAST: This crucial webcast takes an in-depth look at five common enterprise mobility mistakes that may not seem that bad, but can end up killing your mobile initiatives.
Posted: 06 Jan 2014 | Premiered: Jan 6, 2014

Citrix

MDM and Beyond – Rethinking MDM in a BYOD World
sponsored by Citrix
WHITE PAPER: This exclusive paper takes an in-depth look at the BYOD movement and the security challenges it brings, discussing how the right device, application, and data management strategy can allow you deal with these issues and embrace BYOD.
Posted: 03 Jan 2014 | Published: 03 Jan 2014

Citrix

Taking your enterprise mobile:  Executive checklist
sponsored by Citrix
WHITE PAPER: This exclusive paper discusses a mobile computing solution that delivers the real-time defense your organization needs to capture the business opportunities that mobile business brings while safeguarding critical and sensitive information. Read on for a helpful checklist to determine how this solution can bring to your environment.
Posted: 02 Jan 2014 | Published: 02 Jan 2014

Citrix

Mobilizing Windows applications
sponsored by Citrix
WHITE PAPER: This whitepaper provides a project design guide that will help you construct and demonstrate a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

The 7 Biggest Mistakes You Can Make in Web Conferences
sponsored by Citrix Online Go To Meeting
WHITE PAPER: In this white paper, unveil the top 7 biggest things to avoid when conducting web conferences so that you can efficiently and effectively lead meetings even when online.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Citrix Online Go To Meeting

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

Next-generation Firewalls Enable Secure Mobile Network Access
sponsored by Palo Alto Networks
WHITE PAPER: Access this white paper to discover a next-generation firewall that integrates with mobile device management solutions to ensure secure mobile network access from any device that authorized users choose.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Palo Alto Networks

Cisco and Citrix for Productive and Secure Enterprise Mobility
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper discusses the biggest challenges associated with creating a solid mobile infrastructure, including those surrounding simplified access and data protection.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Cisco Systems, Inc and Citrix

Using All the Tools You can
sponsored by Ruckus Wireless
WHITE PAPER: This informative paper discusses the latest generation of Wi-Fi technology and how you can use these tools to get the best Wi-Fi performance possible.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Ruckus Wireless

BYOD Predictions for 2014 - Webinar
sponsored by Enterasys
WEBCAST: This exclusive webcast takes an in-depth look at the future of mobile computing in the enterprise, discussing predictions by industry experts and examining what your organization can do to prepare for what's ahead.
Posted: 16 Jan 2014 | Premiered: Jan 16, 2014

Enterasys

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Embracing Opportunities With Smartphone and Tablets While Eliminating Risks
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this white paper, discover a unified platform that simplifies authentication controls for the ever-growing amount of endpoints to reduce the fear of unauthorized access to sensitive data.
Posted: 09 Jan 2014 | Published: 20 Oct 2011

SafeNet Asia Ltd

How to Implement Continuous Testing for Optimal Mobile Performance
sponsored by SOASTA, Inc
WEBCAST: This on-demand webcast discusses how to implement continuous testing in order to optimize mobile performance, and takes an inside look at the technologies and tools fueling mobile testing success.
Posted: 06 Jan 2014 | Premiered: Dec 11, 2013

SOASTA, Inc

How the New Mobile Supply Chain Impacts Field Sales and Field Service
sponsored by DSI
WHITE PAPER: This FAQ sheet provides answers to your pressing mobile supply chain questions, revealing how mobility is impacting field service and field sales, key benefits you can achieve, and more.
Posted: 03 Jan 2014 | Published: 03 Jan 2014

DSI

Clifford Hallam Healthcare Mobilizes Oracle's JD Edwards Enterprise One and Creates Complete Traceability
sponsored by DSI
CASE STUDY: This brief case study examines how Clifford Hallam Healthcare found success by mobilizing its business processes, which allowed the health service provider to increase accuracy and accountability, reduce labor costs, and more.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

DSI

Checklist: 5 Impactful Tips for Securing BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This comprehensive checklist includes 5 critical things to consider when constructing a mobile security strategy so that your organization can confidently utilize BYOD initiatives without worry of risk.
Posted: 24 Dec 2013 | Published: 24 Dec 2013

Code42

Checklist: A Checklist for BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This exclusive resource provides a helpful checklist that can establish a guide for determining the BYOD strategy for your organization, from infrastructure considerations to security requirements.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Code42
226 - 250 of 956 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement