Smart Phones Reports

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
sponsored by TechTarget Security
EBOOK: Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
Posted: 23 May 2012 | Published: 23 May 2012

TechTarget Security

UC Collaboration Tools: Greater simplicity needed for IT, end users
sponsored by TechTarget Security
EGUIDE: Uncover why many organizations require greater simplicity in their unified communications (UC) collaboration tools – for both end-users and IT – in order for their UC strategy to be a success. Learn best practices to integrate UC tools, potential challenges you may face, and more!
Posted: 21 May 2012 | Published: 21 May 2012

TechTarget Security

Collaboration: Assessing the Business/Technology Issue
sponsored by TechTarget Security
EGUIDE: In the first of SearchUnifiedCommunications.com’s three-part guide on selecting collaboration products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of collaboration solutions.
Posted: 11 May 2012 | Published: 11 May 2012

TechTarget Security

SearchConsumerization.com E-Guide: Enterprise device management: A brave new world
sponsored by TechTarget Security
EGUIDE: This exclusive E-Guide from SearchConsumerization.com examines the latest trends, news and analysis pertaining to IT device management today.
Posted: 10 May 2012 | Published: 09 May 2012

TechTarget Security

MDM features vs. native mobile security
sponsored by TechTarget Security
EGUIDE: When it comes to mobile security, how can you ensure your device is secure? While mobile devices already have native security measures embedded, there are also mobile device management (MDM) products available. Which is the better approach? In this e-guide, expert Lisa Phifer takes a look at the pros and cons of each.
Posted: 24 Apr 2012 | Published: 20 Apr 2012

TechTarget Security

Readying Your Network for Video Collaboration
sponsored by TechTarget Security
EGUIDE: This e-guide reveals the extranet and desktop video requirements that are driving telepresence needs, and also identifies the emerging trends and best practices for videoconferencing available today. Also included, learn how the iPad is becoming a game-changer for some enterprises' video-conferencing strategies.
Posted: 16 Apr 2012 | Published: 16 Apr 2012

TechTarget Security

Mobile Device Security Best Practices
sponsored by TechTarget Security
EGUIDE: While mobile devices have become a key tool for businesses today, it has also introduced a number of security risks that must be addressed. In this expert guide, uncover some of the best mobile security practices and how to balance security and end-user morale.
Posted: 12 Apr 2012 | Published: 12 Apr 2012

TechTarget Security

IT Handbook : Smartphones & Tablets in the Enterprise
sponsored by TechTarget Security
EGUIDE: This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.
Posted: 10 Apr 2012 | Published: 10 Apr 2012

TechTarget Security

Mobile Device Security Best Practices for BYOD
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

TechTarget Security

Provide Secure, Ubiquitous Data For Your Users, Or Face The Consequences!
sponsored by TechTarget Security
EBRIEF: This E-Brief from SearchConsumerization.com explores the issues of data management and how enterprise-level file sharing and syncing solutions can allow corporate data to be safely managed on employee-owned devices.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

TechTarget Security

Expert Tips for Managing Mobile Devices in the Enterprise
sponsored by TechTarget Security
EGUIDE: Get expert tips for managing the mobile device explosion in the enterprise, and also learn about the brave new work of enterprise device management.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

TechTarget Security

Enabling High Performance for Apple iPads in the Enterprise
sponsored by Aruba Networks
WHITE PAPER: Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.
Posted: 30 May 2012 | Published: 20 Sep 2011

Aruba Networks

End User Experience Unplugged
sponsored by Aternity
VIDEO: Discover how a breakthrough end user experience (EUE) management tool can help you unlock performance management for all platforms and application types to ensure the optimal user experience regardless of device or location.
Posted: 23 May 2012 | Premiered: 02 Apr 2012

Aternity

ABBYY TextGrabber + Translator Mobile App
sponsored by ABBYY
VIDEO: This video details a text-grabbing and translator app that lets you save printed text from any magazine, book, document, etc. – in more than 60 languages – on your device. View now to learn how this app can immediately edit, translate, publish to social media, or forward by e-mail or SMS.
Posted: 16 May 2012 | Premiered: 29 Sep 2011

ABBYY

Mobile Unified Communications & Collaboration (UCC)
sponsored by BlackBerry
WHITE PAPER: Explore how you can enable an effective Unified Communications and Collaboration (UCC) strategy for your mobile enterprise. Discover considerations to make, use cases, and more.
Posted: 01 May 2012 | Published: 01 May 2012

BlackBerry

Mobility is moving fast. To stay in control, you have to prepare for change
sponsored by IBM
WHITE PAPER: The practice of BYOD is on the rise and organizations cannot sit back and let employees roam the network with unsupervised devices. It’s time to take action and tackle the common issues and consequences of BYOD. In this paper, uncover seven (7) questions BYOD raises and how you can address them.
Posted: 25 Apr 2012 | Published: 25 Apr 2012

IBM

Five Calls to Make When Developing a Mobile Learning Strategy
sponsored by Skillsoft
WHITE PAPER: This brief resource provides tips for deploying mobility in the workplace.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Expert Discussion: Mobile device security in health care
sponsored by Hewlett Packard Enterprise
EGUIDE: This E-Guide discusses some of the most significant trends and themes concerning mobile device security in health IT. Discover what it will take to deploy a stable, cost-efficient mobile security system in your hospital.
Posted: 12 Apr 2012 | Published: 12 Apr 2012

Hewlett Packard Enterprise

About to Buy: Mobile Device Management Software
sponsored by GroupLogic
EBOOK: Discover how you can take back control of your enterprise from the influx of personally owned mobile devices with the help of mobile device management (MDM) software.
Posted: 05 Apr 2012 | Published: 30 Mar 2012

GroupLogic

Seven Things That You Can Do If You Want to Embrace the Consumerization of IT
sponsored by Good Technology
PRESENTATION TRANSCRIPT: Discover what you can do to embrace the consumerization of IT, letting your employees pick devices and applications of their choice while maintaining the security your organization needs.
Posted: 03 Apr 2012 | Published: 14 Mar 2012

Good Technology

Best Practices for a Mobility Center of Excellence
sponsored by SAP APJ
WHITE PAPER: Mobile technology has taken the business world by storm, and IT teams must deal with a flood of new challenges. Read this paper to learn how to effectively deal with a constantly changing, complex mobile market, extremely high user expectations for rapid delivery of high quality mobile apps, and data security issues across varied devices.
Posted: 27 Mar 2012 | Published: 29 Feb 2012

SAP APJ

Understanding Mobility Trends and Mobile Usage Among Business Users
sponsored by iPass Inc.
WHITE PAPER: Technology and data consumption are evolving faster than mobile networks are able to adapt; what we at iPass are calling “Mobile Darwinism.” Learn more as you explore mobility trends and mobile usage among business users.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

iPass Inc.

Wi-Fi Isn't Dead! How Wi-Fi Is Empowering Today’s Mobile Workforce
sponsored by iPass Inc.
WHITE PAPER: Wi-Fi is back! Or more accurately, it never went away. Years after hearing that Wi-Fi was made obsolete by 3G and more recently 4G, Wi-Fi connectivity is increasing in importance for enterprises that support mobile employees - which is most companies today.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

iPass Inc.

The Ten "Must Haves" for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them.
Posted: 08 Mar 2012 | Published: 30 Dec 2011

Zenprise

Mobile Middleware
sponsored by Apperian, Inc.
EGUIDE: Successful mobile app developers must learn how to correctly size their service-oriented architecture (SOA). Read this e-guide to learn tips and tricks for successfully developing mobile applications.
Posted: 07 Mar 2012 | Published: 07 Mar 2012

Apperian, Inc.