Hardware  >   Networking Hardware  >   Wireless Hardware  >   Handheld Devices  >  

Pocket PC

RSS Feed    Add to Google    Add to My Yahoo!
Pocket PC Reports
 
E-guide: Taking full advantage of the benefits of mobile unified communications: Best practices
sponsored by SearchSecurity.com
EGUIDE: In this SearchUnifiedCommunications.com e-guide, learn the applications, technologies and benefits associated with mobile unified communications (UC) and uncover how you can start taking advantage of them today.
Posted: 18 May 2011 | Published: 18 May 2011

SearchSecurity.com

E-Guide: Best Practices to ensure secure mobile communication
sponsored by SearchSecurity.com
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

Best Practices for mobile authentication
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

Ensuring The Availability of Blackberry Enterprise Server
sponsored by Double-Take Software
WHITE PAPER: In order to implement a plan for protecting and backing up BlackBerry handhelds, it's important to understand how the Blackberry Enterprise Server solution works within an existing email environment. This paper gives a quick lessong to that end, then concentrates on ensuring the availability of the Blackberry Enterprise Server
Posted: 16 Nov 2009 | Published: 16 Oct 2009

Double-Take Software

WaveRunner™ Wireless Tester
sponsored by Fluke Networks
DATA SHEET: Fluke Networks' WaveRunner™ gives you the visibility for managing both your wireless and wireline networks.
Posted: 23 Mar 2004 | Published: 01 Sep 2002

Fluke Networks

How to Extend your Virtual Private Network with Citrix GoToMyPC Corporate
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: Read this white paper to learn how companies can deliver more effective remote access by augmenting their traditional VPN with Web-based technologies.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Citrix Online - GotoMyPC

The Threats Posed by Portable Storage Devices
sponsored by GFI Software
PRODUCT LITERATURE: This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Posted: 25 Jun 2007 | Published: 01 Jun 2007

GFI Software

Introduction to Blackberry® Java® Development
sponsored by BlackBerry
WEBCAST: The Blackberry® Java® Development Environment (BlackBerry JDE) is a fully integrated development environment and simulation tool for building Java Micro Edition (Java ME™) applications for Java-based Blackberry® smartphones.
Posted: 12 Jan 2009 | Premiered: Jan 12, 2009

BlackBerry

Information Security ANZ March 2015
sponsored by SearchSecurity.com
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

School Bus Operator Drives Competitive Advantage with Blackberry Solution
sponsored by BlackBerry
CASE STUDY: Southland Transportation, providing school bus and other transportation services, deployed BlackBerry® smartphones, with a custom-built application, to their drivers so they can report road conditions and delays quickly and easily providing timely and accurate updates for everyone.
Posted: 25 Feb 2009 | Published: 25 Feb 2009

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement